Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-27267 (GCVE-0-2024-27267)
Vulnerability from cvelistv5
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
| URL | Tags | ||||||
|---|---|---|---|---|---|---|---|
|
|||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | SDK, Java Technology Edition |
Version: 7.1.0.0 ≤ 7.1.5.18 Version: 8.0.0.0 ≤ 8.0.8.26 cpe:2.3:a:ibm:java_sdk:7.0.1.0:*:*:*:technology:*:*:* cpe:2.3:a:ibm:java_sdk:7.1.5.18:*:*:*:technology:*:*:* cpe:2.3:a:ibm:java_sdk:8.0.0.0:*:*:*:technology:*:*:* cpe:2.3:a:ibm:java_sdk:8.0.8.26:*:*:*:technology:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-27267",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-14T18:27:40.627571Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-14T18:28:56.564Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:java_sdk:7.0.1.0:*:*:*:technology:*:*:*",
"cpe:2.3:a:ibm:java_sdk:7.1.5.18:*:*:*:technology:*:*:*",
"cpe:2.3:a:ibm:java_sdk:8.0.0.0:*:*:*:technology:*:*:*",
"cpe:2.3:a:ibm:java_sdk:8.0.8.26:*:*:*:technology:*:*:*"
],
"defaultStatus": "unaffected",
"product": "SDK, Java Technology Edition",
"vendor": "IBM",
"versions": [
{
"lessThanOrEqual": "7.1.5.18",
"status": "affected",
"version": "7.1.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0.8.26",
"status": "affected",
"version": "8.0.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads.\u0026nbsp;"
}
],
"value": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-29T17:05:49.132Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7165421"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IBM SDK, Java Technology Edition denial of service",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2024-27267",
"datePublished": "2024-08-14T15:59:46.807Z",
"dateReserved": "2024-02-22T01:26:39.521Z",
"dateUpdated": "2025-09-29T17:05:49.132Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-27267\",\"sourceIdentifier\":\"psirt@us.ibm.com\",\"published\":\"2024-08-14T16:15:10.950\",\"lastModified\":\"2025-09-29T17:15:29.540\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads.\"},{\"lang\":\"es\",\"value\":\"El Object Request Broker (ORB) en IBM SDK, Java Technology Edition 7.1.0.0 a 7.1.5.18 y 8.0.0.0 a 8.0.8.26 es vulnerable a la denegaci\u00f3n remota de servicio, provocada por una condici\u00f3n de ejecuci\u00f3n en la gesti\u00f3n de subprocesos de escucha de ORB. ID de IBM X-Force: 284573.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@us.ibm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:java_sdk:*:*:*:*:java_technology:*:*:*\",\"versionStartIncluding\":\"7.1.0.0\",\"versionEndIncluding\":\"7.1.5.18\",\"matchCriteriaId\":\"5DDFFC65-9A40-45B6-BEAB-AC2A72A0B0BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:java_sdk:*:*:*:*:java_technology:*:*:*\",\"versionStartIncluding\":\"8.0.0.0\",\"versionEndIncluding\":\"8.0.8.26\",\"matchCriteriaId\":\"A0954E69-2308-4A9C-B786-6FB188823ED6\"}]}]}],\"references\":[{\"url\":\"https://www.ibm.com/support/pages/node/7165421\",\"source\":\"psirt@us.ibm.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-27267\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-14T18:27:40.627571Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-14T18:28:40.972Z\"}}], \"cna\": {\"title\": \"IBM SDK, Java Technology Edition denial of service\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ibm:java_sdk:7.0.1.0:*:*:*:technology:*:*:*\", \"cpe:2.3:a:ibm:java_sdk:7.1.5.18:*:*:*:technology:*:*:*\", \"cpe:2.3:a:ibm:java_sdk:8.0.0.0:*:*:*:technology:*:*:*\", \"cpe:2.3:a:ibm:java_sdk:8.0.8.26:*:*:*:technology:*:*:*\"], \"vendor\": \"IBM\", \"product\": \"SDK, Java Technology Edition\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.1.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.1.5.18\"}, {\"status\": \"affected\", \"version\": \"8.0.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.8.26\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.ibm.com/support/pages/node/7165421\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads.\u0026nbsp;\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-362\", \"description\": \"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"shortName\": \"ibm\", \"dateUpdated\": \"2025-09-29T17:05:49.132Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-27267\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-29T17:05:49.132Z\", \"dateReserved\": \"2024-02-22T01:26:39.521Z\", \"assignerOrgId\": \"9a959283-ebb5-44b6-b705-dcc2bbced522\", \"datePublished\": \"2024-08-14T15:59:46.807Z\", \"assignerShortName\": \"ibm\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-0692
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | Security QRadar EDR versions 3.12.x antérieures à 3.12.10 | ||
| IBM | WebSphere | IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions antérieures à 8 Service Refresh 8 FP30 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.2.x à 7.5.x antérieures à 7.5.3 | ||
| IBM | Db2 | Db2 versions 11.5.x sans le dernier correctif de sécurité | ||
| IBM | AIX | AIX version 7.3 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | QRadar SIEM | QRadar Suite versions 1.10.x antérieures à 1.10.24.0 | ||
| IBM | VIOS | VIOS version 4.1 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x antérieures à 8.5.5.11 ou sans le correctif de sécurité temporaire PH62458 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.2.x antérieures à 6.2.1.0 GA iFix13 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.3.x antérieures à 6.3.1.0 GA iFix02 | ||
| IBM | Cognos Analytics | Cognos Dashboards on Cloud Pak for Data versions antérieures à 5.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions ant\u00e9rieures \u00e0 8 Service Refresh 8 FP30",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 7.2.x \u00e0 7.5.x ant\u00e9rieures \u00e0 7.5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.5.x sans le dernier correctif de s\u00e9curit\u00e9 ",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite versions 1.10.x ant\u00e9rieures \u00e0 1.10.24.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.11 ou sans le correctif de s\u00e9curit\u00e9 temporaire PH62458",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.x ant\u00e9rieures \u00e0 6.2.1.0 GA iFix13",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.x ant\u00e9rieures \u00e0 6.3.1.0 GA iFix02",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.0.0",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-23613",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23613"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2023-29256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29256"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-25024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25024"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-35012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35012"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-27869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27869"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2023-27868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27868"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-37168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37168"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-41917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41917"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2024-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22233"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2023-30442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30442"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2024-30261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30261"
},
{
"name": "CVE-2023-27867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27867"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2024-30260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30260"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23487"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-28799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28799"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2023-23612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23612"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2024-08-16T00:00:00",
"last_revision_date": "2024-08-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0692",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-08-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165247",
"url": "https://www.ibm.com/support/pages/node/7165247"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165360",
"url": "https://www.ibm.com/support/pages/node/7165360"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165340",
"url": "https://www.ibm.com/support/pages/node/7165340"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165344",
"url": "https://www.ibm.com/support/pages/node/7165344"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165423",
"url": "https://www.ibm.com/support/pages/node/7165423"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165284",
"url": "https://www.ibm.com/support/pages/node/7165284"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165362",
"url": "https://www.ibm.com/support/pages/node/7165362"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165364",
"url": "https://www.ibm.com/support/pages/node/7165364"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165363",
"url": "https://www.ibm.com/support/pages/node/7165363"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165488",
"url": "https://www.ibm.com/support/pages/node/7165488"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165685",
"url": "https://www.ibm.com/support/pages/node/7165685"
}
]
}
CERTFR-2024-AVI-0958
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x antérieures à 2.3.4.1 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.13 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.2 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | AIX | AIX version 7.3 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.3 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF01 | ||
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.0 avec Db2 versions antérieures à 11.5.9 Special Build | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
| IBM | VIOS | VIOS version 3.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.27.0 | ||
| IBM | Cloud Transformation Advisor | Cloud Transformation Advisor versions antérieures à 3.10.2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.10.27.0 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.15 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cloud Pak System versions 2.3.4.x ant\u00e9rieures \u00e0 2.3.4.1",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.13",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.2 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak System versions 2.3.4.0 avec Db2 versions ant\u00e9rieures \u00e0 11.5.9 Special Build",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 3.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Transformation Advisor versions ant\u00e9rieures \u00e0 3.10.2 ",
"product": {
"name": "Cloud Transformation Advisor",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.15",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2022-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23181"
},
{
"name": "CVE-2021-42340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-34305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34305"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42252"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2023-28708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
},
{
"name": "CVE-2024-26718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2017-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11468"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2021-46939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
},
{
"name": "CVE-2024-26870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-27388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2021-47231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
},
{
"name": "CVE-2021-47284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47284"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47408"
},
{
"name": "CVE-2021-47449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47449"
},
{
"name": "CVE-2021-47461",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47461"
},
{
"name": "CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"name": "CVE-2021-47491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47491"
},
{
"name": "CVE-2021-47548",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52707"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52756"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-26940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26940"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35938"
},
{
"name": "CVE-2024-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2024-26962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26962"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-34069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2022-48747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2024-26703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2021-47018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47018"
},
{
"name": "CVE-2021-47257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47257"
},
{
"name": "CVE-2021-47304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47304"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2021-47624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52471"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2023-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
},
{
"name": "CVE-2023-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2021-42694",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42694"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2021-43980",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43980"
},
{
"name": "CVE-2023-20584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
},
{
"name": "CVE-2023-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
},
{
"name": "CVE-2023-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36328"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2023-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5115"
},
{
"name": "CVE-2023-52596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52596"
},
{
"name": "CVE-2023-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5764"
},
{
"name": "CVE-2024-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21529"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2024-25620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25620"
},
{
"name": "CVE-2024-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26147"
},
{
"name": "CVE-2024-26713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26713"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-26823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26823"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-31882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-35136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
},
{
"name": "CVE-2024-35152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
},
{
"name": "CVE-2024-37529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2024-42254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42254"
},
{
"name": "CVE-2024-42255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42255"
},
{
"name": "CVE-2024-42256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42256"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-46982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46982"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2024-11-08T00:00:00",
"last_revision_date": "2024-11-08T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0958",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174802",
"url": "https://www.ibm.com/support/pages/node/7174802"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174634",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174639",
"url": "https://www.ibm.com/support/pages/node/7174639"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175196",
"url": "https://www.ibm.com/support/pages/node/7175196"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175086",
"url": "https://www.ibm.com/support/pages/node/7175086"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175192",
"url": "https://www.ibm.com/support/pages/node/7175192"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174799",
"url": "https://www.ibm.com/support/pages/node/7174799"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174797",
"url": "https://www.ibm.com/support/pages/node/7174797"
},
{
"published_at": "2024-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174945",
"url": "https://www.ibm.com/support/pages/node/7174945"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174912",
"url": "https://www.ibm.com/support/pages/node/7174912"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175166",
"url": "https://www.ibm.com/support/pages/node/7175166"
}
]
}
CERTFR-2024-AVI-0992
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | IBM Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.10 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.2x antérieures à 6.2.0.3 | ||
| IBM | Sterling | IBM Sterling Transformation Extender versions 10.1.1.x antérieures à 10.1.1.1 avec les derniers correctifs de sécurité | ||
| IBM | Sterling | IBM Sterling Transformation Extender versions 10.1.2.x antérieures à 10.1.2.1 avec les derniers correctifs de sécurité | ||
| IBM | Sterling | IBM Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.25 | ||
| IBM | Sterling | IBM Sterling Secure Proxy versions 6.0.x antérireures à 6.0.3.1 | ||
| IBM | Sterling | IBM Sterling B2B Integrator versions 6.x antérieures à 6.1.2.6 | ||
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.x antérieures à 8.6.1.6 avec les derniers correctifs de sécurité | ||
| IBM | Sterling | IBM Sterling Transformation Extender versions 10.1.0.x antérieures à 10.1.0.2 avec les derniers correctifs de sécurité | ||
| IBM | Sterling | IBM Sterling Connect:Direct Web Services versions 6.1.x antérieures à 6.1.0.26 | ||
| IBM | Sterling | IBM Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
| IBM | Sterling | IBM Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
| IBM | QRadar | QRadar WinCollect Agent versions 10.x antérieures à 10.1.13 | ||
| IBM | Sterling | IBM Sterling Transformation Extender versions 11.x antérieures à 11.0.0.0 avec les derniers correctifs de sécurité | ||
| IBM | Sterling | IBM Sterling Secure Proxy versions 6.1.x antérireures à 6.1.0.1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 \t6.3.0.10",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.2x ant\u00e9rieures \u00e0 6.2.0.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender versions 10.1.1.x ant\u00e9rieures \u00e0 10.1.1.1 avec les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender versions 10.1.2.x ant\u00e9rieures \u00e0 10.1.2.1 avec les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 \t\t6.2.0.25",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Secure Proxy versions 6.0.x ant\u00e9rireures \u00e0\t6.0.3.1 ",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.x ant\u00e9rieures \u00e0 6.1.2.6 ",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere eXtreme Scale versions 8.6.x ant\u00e9rieures \u00e0 8.6.1.6 avec les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender versions 10.1.0.x ant\u00e9rieures \u00e0 10.1.0.2 avec les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x ant\u00e9rieures \u00e0 \t6.1.0.26",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar WinCollect Agent versions 10.x ant\u00e9rieures \u00e0 10.1.13",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Transformation Extender versions 11.x ant\u00e9rieures \u00e0 11.0.0.0 avec les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Secure Proxy versions 6.1.x ant\u00e9rireures \u00e0\t6.1.0.1 ",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-31582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31582"
},
{
"name": "CVE-2024-24816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24816"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2021-41164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41164"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2024-25015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25015"
},
{
"name": "CVE-2024-25048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25048"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2018-11784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11784"
},
{
"name": "CVE-2021-32809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32809"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-24815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24815"
},
{
"name": "CVE-2022-24728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24728"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-28439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28439"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-41783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41783"
},
{
"name": "CVE-2022-24729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24729"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2024-27268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27268"
},
{
"name": "CVE-2021-32808",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32808"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-51462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51462"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-37695",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37695"
},
{
"name": "CVE-2023-4771",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4771"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2023-51441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51441"
},
{
"name": "CVE-2021-41165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41165"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
}
],
"initial_release_date": "2024-11-15T00:00:00",
"last_revision_date": "2024-11-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0992",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176069",
"url": "https://www.ibm.com/support/pages/node/7176069"
},
{
"published_at": "2024-11-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175883",
"url": "https://www.ibm.com/support/pages/node/7175883"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176037",
"url": "https://www.ibm.com/support/pages/node/7176037"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176066",
"url": "https://www.ibm.com/support/pages/node/7176066"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175724",
"url": "https://www.ibm.com/support/pages/node/7175724"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176039",
"url": "https://www.ibm.com/support/pages/node/7176039"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175229",
"url": "https://www.ibm.com/support/pages/node/7175229"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176043",
"url": "https://www.ibm.com/support/pages/node/7176043"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175729",
"url": "https://www.ibm.com/support/pages/node/7175729"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176063",
"url": "https://www.ibm.com/support/pages/node/7176063"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176022",
"url": "https://www.ibm.com/support/pages/node/7176022"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176055",
"url": "https://www.ibm.com/support/pages/node/7176055"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176189",
"url": "https://www.ibm.com/support/pages/node/7176189"
},
{
"published_at": "2024-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7176045",
"url": "https://www.ibm.com/support/pages/node/7176045"
}
]
}
CERTFR-2025-AVI-0170
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 12.2.4 IF4 | ||
| IBM | QRadar | QRadar Data Synchronization versions antérieures à 3.2.1 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 iFix 02 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x sans le correctif de sécurité temporaire PH16353 ou antérieures à 9.0.5.2 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.x antérieures à 6.1.0.2 iFix 02 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 4.x sans le dernier correctif de sécurité | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 IF2 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.0.x antérieures à 6.0.3.1 iFix 02 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.1 iFix 01 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 5.x antérieures à 5.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 12.2.4 IF4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Data Synchronization versions ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x sans le correctif de s\u00e9curit\u00e9 temporaire PH16353 ou ant\u00e9rieures \u00e0 9.0.5.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.2 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 4.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.1 iFix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 5.x ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21536"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35946"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2015-7450",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7450"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2018-19797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19797"
},
{
"name": "CVE-2023-28523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28523"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2018-19827",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19827"
},
{
"name": "CVE-2018-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11694"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40094"
},
{
"name": "CVE-2023-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24807"
},
{
"name": "CVE-2025-22150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22150"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-56340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56340"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2024-45216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45216"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-28527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28527"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2019-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6286"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2018-19839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19839"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-45217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45217"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2018-20821",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20821"
},
{
"name": "CVE-2019-6283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6283"
},
{
"name": "CVE-2023-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35947"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30204"
},
{
"name": "CVE-2018-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20190"
},
{
"name": "CVE-2023-28526",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28526"
},
{
"name": "CVE-2023-28155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28155"
},
{
"name": "CVE-2018-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11698"
},
{
"name": "CVE-2025-0823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0823"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2020-7598",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7598"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2025-02-28T00:00:00",
"last_revision_date": "2025-02-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183676",
"url": "https://www.ibm.com/support/pages/node/7183676"
},
{
"published_at": "2019-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1107105",
"url": "https://www.ibm.com/support/pages/node/1107105"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184475",
"url": "https://www.ibm.com/support/pages/node/7184475"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184474",
"url": "https://www.ibm.com/support/pages/node/7184474"
},
{
"published_at": "2025-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184092",
"url": "https://www.ibm.com/support/pages/node/7184092"
},
{
"published_at": "2025-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184217",
"url": "https://www.ibm.com/support/pages/node/7184217"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184476",
"url": "https://www.ibm.com/support/pages/node/7184476"
}
]
}
CERTFR-2025-AVI-0562
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | DB2 Data Management Console versions 3.1.x postérieures à 3.1.11 et antérieures à 3.1.13.1 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP6 | ||
| IBM | Sterling | Sterling Transformation Extender version 10.1.1.1 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Sterling | Sterling Transformation Extender version 11.0.0.0 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Sterling | Sterling Transformation Extender version 10.1.0.2 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 FP1 | ||
| IBM | Sterling | Sterling Transformation Extender version 10.1.2.1 sans le correctif de sécurité APAR PH67014 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 14.10.x antérieures à 14.10.xC11W2 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct File Agent versions 1.4.0.x antérieures à 1.4.0.4 | ||
| IBM | Sterling | Sterling Transformation Extender versions 11.0.1.x antérieures à 11.0.1.1 sans le correctif de sécurité APAR PH67016 | ||
| IBM | Db2 | DB2 Data Management Console pour CPD versions antérieures à 5.1.2 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 12.10.x antérieures à 12.10.xC16W2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DB2 Data Management Console versions 3.1.x post\u00e9rieures \u00e0 3.1.11 et ant\u00e9rieures \u00e0 3.1.13.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP6",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 10.1.1.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 11.0.0.0 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 10.1.0.2 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 FP1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender version 10.1.2.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67014",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 14.10.x ant\u00e9rieures \u00e0 14.10.xC11W2",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct File Agent versions 1.4.0.x ant\u00e9rieures \u00e0 1.4.0.4",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Transformation Extender versions 11.0.1.x ant\u00e9rieures \u00e0 11.0.1.1 sans le correctif de s\u00e9curit\u00e9 \n APAR PH67016",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Data Management Console pour CPD versions ant\u00e9rieures \u00e0 5.1.2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 12.10.x ant\u00e9rieures \u00e0 12.10.xC16W2",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2025-1302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1302"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-52900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52900"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2025-1991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1991"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2025-07-04T00:00:00",
"last_revision_date": "2025-07-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0562",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-06-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238455",
"url": "https://www.ibm.com/support/pages/node/7238455"
},
{
"published_at": "2025-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238755",
"url": "https://www.ibm.com/support/pages/node/7238755"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238833",
"url": "https://www.ibm.com/support/pages/node/7238833"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238824",
"url": "https://www.ibm.com/support/pages/node/7238824"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238831",
"url": "https://www.ibm.com/support/pages/node/7238831"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238826",
"url": "https://www.ibm.com/support/pages/node/7238826"
},
{
"published_at": "2025-07-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238830",
"url": "https://www.ibm.com/support/pages/node/7238830"
},
{
"published_at": "2025-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238753",
"url": "https://www.ibm.com/support/pages/node/7238753"
},
{
"published_at": "2025-06-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7238163",
"url": "https://www.ibm.com/support/pages/node/7238163"
}
]
}
CERTFR-2024-AVI-0923
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling Connect:Express pour UNIX versions 1.5.x antérieures à 1.5.0.17010 | ||
| IBM | QRadar | QRadar Assistant versions antérieures à 3.8.1 | ||
| IBM | Cognos Analytics | Cognos Analytics Mobile (Android) versions 1.1.x antérieures à 1.1.20 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.0.x antérieures à 6.0.3.1 GA | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.5.0 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 GA | ||
| IBM | Cognos Analytics | Cognos Analytics Mobile (iOS) versions 1.1.x antérieures à 1.1.20 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 GA |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Express pour UNIX versions 1.5.x ant\u00e9rieures \u00e0 1.5.0.17010",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Assistant versions ant\u00e9rieures \u00e0 3.8.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics Mobile (Android) versions 1.1.x ant\u00e9rieures \u00e0 1.1.20",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.5.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 ",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics Mobile (iOS) versions 1.1.x ant\u00e9rieures \u00e0 1.1.20",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0144"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-25166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25166"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-28856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28856"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2018-12538",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12538"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2023-38737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38737"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2022-36943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36943"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38009"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2020-27216",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27216"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-29622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29622"
},
{
"name": "CVE-2021-40690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40690"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2023-45145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45145"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2023-0842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0842"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-43383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43383"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2022-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2018-12545",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12545"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-41784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41784"
},
{
"name": "CVE-2021-3803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3803"
},
{
"name": "CVE-2023-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40167"
},
{
"name": "CVE-2023-41900",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41900"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2022-24834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24834"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2022-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0235"
},
{
"name": "CVE-2019-10241",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10241"
},
{
"name": "CVE-2022-24736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24736"
},
{
"name": "CVE-2024-25042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25042"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2020-15168",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15168"
},
{
"name": "CVE-2023-29262",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29262"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2022-24735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24735"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2012-2677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2677"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2021-34428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34428"
}
],
"initial_release_date": "2024-10-25T00:00:00",
"last_revision_date": "2024-10-25T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0923",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173631",
"url": "https://www.ibm.com/support/pages/node/7173631"
},
{
"published_at": "2024-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174016",
"url": "https://www.ibm.com/support/pages/node/7174016"
},
{
"published_at": "2024-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174015",
"url": "https://www.ibm.com/support/pages/node/7174015"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173632",
"url": "https://www.ibm.com/support/pages/node/7173632"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172691",
"url": "https://www.ibm.com/support/pages/node/7172691"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172692",
"url": "https://www.ibm.com/support/pages/node/7172692"
},
{
"published_at": "2024-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173592",
"url": "https://www.ibm.com/support/pages/node/7173592"
},
{
"published_at": "2024-10-23",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173866",
"url": "https://www.ibm.com/support/pages/node/7173866"
}
]
}
CERTFR-2025-AVI-0651
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 14.10.x sans le dernier correctif de sécurité | ||
| IBM | Db2 | Db2 versions 12.1.x antérieures à 12.1.2 | ||
| IBM | QRadar | QRadar Investigation Assistant versions 1.x antérieures à 1.1.0 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 12.10.x sans le dernier correctif de sécurité | ||
| IBM | Cognos Analytics | Cognos Analytics 12.1.x antérieures à 12.1.0 IF2 | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité PH67120 et PH67183 | ||
| IBM | Db2 | Db2 versions 11.1.x antérieures à 11.1.4 FP7 sans le dernier correctif de sécurité temporaire | ||
| IBM | Tivoli | Tivoli System Automation Application Manager 4.1 sans le correctif de sécurité pour WebSphere Application Server 9.0 | ||
| IBM | Cognos Analytics | Cognos Analytics 11.2.x antérieures à 11.2.4 FP6 | ||
| IBM | Db2 | Db2 versions 11.5.x antérieures à 11.5.9 sans le dernier correctif de sécurité temporaire | ||
| IBM | Cognos Analytics | Cognos Analytics 12.0.x antérieures à 12.0.4 FP1 | ||
| IBM | Db2 | Db2 versions 10.5.x antérieures à 10.5 FP11 sans le dernier correctif de sécurité temporaire |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Informix Dynamic Server versions 14.10.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 12.1.x ant\u00e9rieures \u00e0 12.1.2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Investigation Assistant versions 1.x ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 12.10.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics\t12.1.x ant\u00e9rieures \u00e0 12.1.0 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 PH67120 et PH67183",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.1.x ant\u00e9rieures \u00e0 11.1.4 FP7 sans le dernier correctif de s\u00e9curit\u00e9 temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Tivoli System Automation Application Manager 4.1 sans le correctif de s\u00e9curit\u00e9 pour WebSphere Application Server 9.0",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics\t11.2.x ant\u00e9rieures \u00e0 11.2.4 FP6",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.9 sans le dernier correctif de s\u00e9curit\u00e9 temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics\t12.0.x ant\u00e9rieures \u00e0 12.0.4 FP1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 10.5.x ant\u00e9rieures \u00e0 10.5 FP11 sans le dernier correctif de s\u00e9curit\u00e9 temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49342"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-30472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49343"
},
{
"name": "CVE-2025-47278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47278"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-27607",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27607"
},
{
"name": "CVE-2025-48387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48387"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
}
],
"initial_release_date": "2025-08-01T00:00:00",
"last_revision_date": "2025-08-01T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0651",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240941",
"url": "https://www.ibm.com/support/pages/node/7240941"
},
{
"published_at": "2025-07-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240649",
"url": "https://www.ibm.com/support/pages/node/7240649"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240898",
"url": "https://www.ibm.com/support/pages/node/7240898"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240775",
"url": "https://www.ibm.com/support/pages/node/7240775"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240798",
"url": "https://www.ibm.com/support/pages/node/7240798"
},
{
"published_at": "2025-07-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239462",
"url": "https://www.ibm.com/support/pages/node/7239462"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240952",
"url": "https://www.ibm.com/support/pages/node/7240952"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240940",
"url": "https://www.ibm.com/support/pages/node/7240940"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240946",
"url": "https://www.ibm.com/support/pages/node/7240946"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240777",
"url": "https://www.ibm.com/support/pages/node/7240777"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240899",
"url": "https://www.ibm.com/support/pages/node/7240899"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240977",
"url": "https://www.ibm.com/support/pages/node/7240977"
}
]
}
CERTFR-2025-AVI-0154
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP11 IF01 | ||
| IBM | Controller | Controller versions 11.1.0.x antérieures à 11.1.0.1 | ||
| IBM | MaaS360 | MaaS360 Base, Configuration Utility versions antérieures à 3.001.100 | ||
| IBM | MaaS360 | MaaS360 Mobile Enterprise Gateway versions antérieures à 3.001.100 | ||
| IBM | Cognos Controller | Cognos Controller versions 11.x antérieures à 11.0.1 FP4 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP11 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Controller versions 11.1.0.x ant\u00e9rieures \u00e0 11.1.0.1",
"product": {
"name": "Controller",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "MaaS360 Base, Configuration Utility versions ant\u00e9rieures \u00e0 3.001.100",
"product": {
"name": "MaaS360",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "MaaS360 Mobile Enterprise Gateway versions ant\u00e9rieures \u00e0 3.001.100",
"product": {
"name": "MaaS360",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Controller versions 11.x ant\u00e9rieures \u00e0 11.0.1 FP4",
"product": {
"name": "Cognos Controller",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-45084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45084"
},
{
"name": "CVE-2024-45081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45081"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2021-36373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36373"
},
{
"name": "CVE-2015-2325",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2325"
},
{
"name": "CVE-2024-28780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28780"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2021-36374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36374"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52902"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2023-47160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47160"
},
{
"name": "CVE-2024-28776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28776"
},
{
"name": "CVE-2024-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21907"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2024-40642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40642"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-4245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4245"
},
{
"name": "CVE-2022-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4244"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2020-11979",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11979"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-28777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28777"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"initial_release_date": "2025-02-21T00:00:00",
"last_revision_date": "2025-02-21T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0154",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183597",
"url": "https://www.ibm.com/support/pages/node/7183597"
},
{
"published_at": "2025-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183584",
"url": "https://www.ibm.com/support/pages/node/7183584"
},
{
"published_at": "2025-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183612",
"url": "https://www.ibm.com/support/pages/node/7183612"
}
]
}
CERTFR-2024-AVI-0797
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | Spectrum Control versions 5.4.x antérieures à 5.4.12.1 | ||
| IBM | Db2 | DB2 Query Management Facility pour z/OS versions 12.2 et 13.1 sans la dernière version du JRE | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP9 IF03 | ||
| IBM | AIX | AIX version 7.3 avec Python versions 3.9.x antérieures à 3.9.19.3 | ||
| IBM | VIOS | VIOS version 4.1 avec Python versions 3.9.x antérieures à 3.9.19.3 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Spectrum Control versions 5.4.x ant\u00e9rieures \u00e0 5.4.12.1",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "DB2 Query Management Facility pour z/OS versions 12.2 et 13.1 sans la derni\u00e8re version du JRE",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP9 IF03",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec Python versions 3.9.x ant\u00e9rieures \u00e0 3.9.19.3",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec Python versions 3.9.x ant\u00e9rieures \u00e0 3.9.19.3",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2024-09-20T00:00:00",
"last_revision_date": "2024-09-20T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0797",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7168925",
"url": "https://www.ibm.com/support/pages/node/7168925"
},
{
"published_at": "2024-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7168815",
"url": "https://www.ibm.com/support/pages/node/7168815"
},
{
"published_at": "2024-09-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7168787",
"url": "https://www.ibm.com/support/pages/node/7168787"
},
{
"published_at": "2024-09-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7168639",
"url": "https://www.ibm.com/support/pages/node/7168639"
}
]
}
CERTFR-2024-AVI-0841
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | Cloud Application Business Insights versions 1.1.8.x sans le correctif de sécurité ICABI FixPack 1.1.8.5 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à v5.0.3 | ||
| IBM | N/A | Cloud Application Business Insights versions 1.1.7.x sans le correctif de sécurité ICABI FixPack 1.1.7.10 | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à v5.0.3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cloud Application Business Insights versions 1.1.8.x sans le correctif de s\u00e9curit\u00e9 ICABI FixPack 1.1.8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.0.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Application Business Insights versions 1.1.7.x sans le correctif de s\u00e9curit\u00e9 ICABI FixPack 1.1.7.10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.0.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2024-3154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3154"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2020-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2023-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25613"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2019-10202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2024-39249",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39249"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2021-43784",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43784"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2024-23653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23653"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2024-23651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23651"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2022-34038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34038"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-23652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23652"
},
{
"name": "CVE-2024-3727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3727"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"initial_release_date": "2024-10-04T00:00:00",
"last_revision_date": "2024-10-04T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0841",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-09-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7171677",
"url": "https://www.ibm.com/support/pages/node/7171677"
},
{
"published_at": "2024-09-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7171704",
"url": "https://www.ibm.com/support/pages/node/7171704"
}
]
}
gsd-2024-27267
Vulnerability from gsd
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-27267"
],
"id": "GSD-2024-27267",
"modified": "2024-02-22T06:03:35.281164Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-27267",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
wid-sec-w-2024-3518
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM SPSS ist ein umfassendes Set von Daten- und prognostischen Analyse-Tools f\u00fcr Gesch\u00e4ftsbenutzer, Analysten und Statistik-Programmierer.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM SPSS ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3518 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3518.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3518 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3518"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-11-20",
"url": "https://www.ibm.com/support/pages/node/7176769"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-11-20",
"url": "https://www.ibm.com/support/pages/node/7176770"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-11-20",
"url": "https://www.ibm.com/support/pages/node/7176771"
}
],
"source_lang": "en-US",
"title": "IBM SPSS: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-11-20T23:00:00.000+00:00",
"generator": {
"date": "2024-11-21T12:02:43.681+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3518",
"initial_release_date": "2024-11-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.5-CDS-SemeruJRE17.0.12",
"product": {
"name": "IBM SPSS \u003c8.5-CDS-SemeruJRE17.0.12",
"product_id": "T039381"
}
},
{
"category": "product_version",
"name": "8.5-CDS-SemeruJRE17.0.12",
"product": {
"name": "IBM SPSS 8.5-CDS-SemeruJRE17.0.12",
"product_id": "T039381-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spss:8.5-cds-semerujre17.0.12"
}
}
}
],
"category": "product_name",
"name": "SPSS"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2597",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM SPSS, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Zustand zu erzeugen und nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039381"
]
},
"release_date": "2024-11-20T23:00:00.000+00:00",
"title": "CVE-2023-2597"
},
{
"cve": "CVE-2024-22361",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM SPSS, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Zustand zu erzeugen und nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039381"
]
},
"release_date": "2024-11-20T23:00:00.000+00:00",
"title": "CVE-2024-22361"
},
{
"cve": "CVE-2024-27267",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM SPSS, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Zustand zu erzeugen und nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039381"
]
},
"release_date": "2024-11-20T23:00:00.000+00:00",
"title": "CVE-2024-27267"
}
]
}
wid-sec-w-2024-1955
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Java SDK ist die Java Software Development Kit Portierung von IBM.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Java SDK ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1955 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1955.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1955 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1955"
},
{
"category": "external",
"summary": "IBM Java Security Update August 2024, Stand vom 2024-08-30",
"url": "https://www.ibm.com/support/pages/java-sdk-security-vulnerabilities#IBM_Security_Update_August_2024"
},
{
"category": "external",
"summary": "IBM Security Advisory",
"url": "https://www.ibm.com/support/pages/node/7165421"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168397 vom 2024-09-14",
"url": "https://www.ibm.com/support/pages/node/7168397"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168445 vom 2024-09-13",
"url": "https://www.ibm.com/support/pages/node/7168445"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168388 vom 2024-09-13",
"url": "https://www.ibm.com/support/pages/node/7168388"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168655 vom 2024-09-17",
"url": "https://www.ibm.com/support/pages/node/7168655"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168725 vom 2024-09-17",
"url": "https://www.ibm.com/support/pages/node/7168725"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7169585 vom 2024-09-20",
"url": "https://www.ibm.com/support/pages/node/7169585"
},
{
"category": "external",
"summary": "HCL Article KB0116332 vom 2024-09-26",
"url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0116332"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173018 vom 2024-10-14",
"url": "https://www.ibm.com/support/pages/node/7173018"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7174323 vom 2024-10-29",
"url": "https://www.ibm.com/support/pages/node/7174323"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7174422 vom 2024-10-30",
"url": "https://www.ibm.com/support/pages/node/7174422"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7174636 vom 2024-11-01",
"url": "https://www.ibm.com/support/pages/node/7174636"
},
{
"category": "external",
"summary": "HCL vom 2024-11-06",
"url": "https://support.hcl-software.com/community?id=community_blog\u0026sys_id=cc4fa34493b9de100dddf87d1dba10c4"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6985269 vom 2024-11-11",
"url": "https://aix.software.ibm.com/aix/efixes/security/java_nov2024_advisory.asc"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7175763 vom 2024-11-12",
"url": "https://www.ibm.com/support/pages/node/7175763"
},
{
"category": "external",
"summary": "HCL Security Bulletin KB0117143 vom 2024-11-24",
"url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0117143"
},
{
"category": "external",
"summary": "HCL Security Bulletin vom 2024-12-05",
"url": "https://support.hcl-software.com/community?id=community_blog\u0026sys_id=1cd95e11931ad610ba9fb1566aba10ca"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183115 vom 2025-02-13",
"url": "https://www.ibm.com/support/pages/node/7183115"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7145183 vom 2025-06-24",
"url": "https://www.ibm.com/support/pages/node/7145183"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7145433 vom 2025-06-24",
"url": "https://www.ibm.com/support/pages/node/7145433"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7238163 vom 2025-06-28",
"url": "https://www.ibm.com/support/pages/node/7238163"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7240775 vom 2025-07-28",
"url": "https://www.ibm.com/support/pages/node/7240775"
}
],
"source_lang": "en-US",
"title": "IBM Java SDK: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-07-27T22:00:00.000+00:00",
"generator": {
"date": "2025-07-28T07:59:55.314+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1955",
"initial_release_date": "2024-08-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-09-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-28T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2024-12-04T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.7.0",
"product": {
"name": "HCL AppScan Enterprise \u003c10.7.0",
"product_id": "T038717"
}
},
{
"category": "product_version",
"name": "10.7.0",
"product": {
"name": "HCL AppScan Enterprise 10.7.0",
"product_id": "T038717-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:appscan_enterprise:10.7.0"
}
}
}
],
"category": "product_name",
"name": "AppScan Enterprise"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Inventory \u003c11.0.1.0",
"product": {
"name": "HCL BigFix Inventory \u003c11.0.1.0",
"product_id": "T037844"
}
},
{
"category": "product_version",
"name": "Inventory 11.0.1.0",
"product": {
"name": "HCL BigFix Inventory 11.0.1.0",
"product_id": "T037844-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:inventory__11.0.1.0"
}
}
},
{
"category": "product_version",
"name": "Compliance",
"product": {
"name": "HCL BigFix Compliance",
"product_id": "T038829",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:compliance"
}
}
},
{
"category": "product_version_range",
"name": "Compliance \u003c2.0.12",
"product": {
"name": "HCL BigFix Compliance \u003c2.0.12",
"product_id": "T038834"
}
},
{
"category": "product_version",
"name": "Compliance 2.0.12",
"product": {
"name": "HCL BigFix Compliance 2.0.12",
"product_id": "T038834-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:compliance__2.0.12"
}
}
}
],
"category": "product_name",
"name": "BigFix"
}
],
"category": "vendor",
"name": "HCL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "12.0.1.0-12.0.12.5",
"product": {
"name": "IBM App Connect Enterprise 12.0.1.0-12.0.12.5",
"product_id": "T037768",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.5"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow",
"product": {
"name": "IBM Business Automation Workflow",
"product_id": "T019704",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.4 FP1",
"product": {
"name": "IBM Cognos Analytics \u003c12.0.4 FP1",
"product_id": "T044555"
}
},
{
"category": "product_version",
"name": "12.0.4 FP1",
"product": {
"name": "IBM Cognos Analytics 12.0.4 FP1",
"product_id": "T044555-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:cognos_analytics:12.0.4_fp1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.2.4 FP6",
"product": {
"name": "IBM Cognos Analytics \u003c11.2.4 FP6",
"product_id": "T044912"
}
},
{
"category": "product_version",
"name": "11.2.4 FP6",
"product": {
"name": "IBM Cognos Analytics 11.2.4 FP6",
"product_id": "T044912-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:cognos_analytics:11.2.4_fp6"
}
}
}
],
"category": "product_name",
"name": "Cognos Analytics"
},
{
"branches": [
{
"category": "product_version",
"name": "10.0.0.0",
"product": {
"name": "IBM InfoSphere Identity Insight 10.0.0.0",
"product_id": "T033658",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_identity_insight:10.0.0.0"
}
}
},
{
"category": "product_version",
"name": "9.0.0.1",
"product": {
"name": "IBM InfoSphere Identity Insight 9.0.0.1",
"product_id": "T035627",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_identity_insight:9.0.0.1"
}
}
}
],
"category": "product_name",
"name": "InfoSphere Identity Insight"
},
{
"branches": [
{
"category": "product_version",
"name": "11.7",
"product": {
"name": "IBM InfoSphere Information Server 11.7",
"product_id": "444803",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:11.7"
}
}
}
],
"category": "product_name",
"name": "InfoSphere Information Server"
},
{
"category": "product_name",
"name": "IBM Informix",
"product": {
"name": "IBM Informix",
"product_id": "5121",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:informix:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "for zos 10.1-10.1.0.4",
"product": {
"name": "IBM Integration Bus for zos 10.1-10.1.0.4",
"product_id": "T037307",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:integration_bus:for_zos_10.1_-_10.1.0.4"
}
}
}
],
"category": "product_name",
"name": "Integration Bus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.8.30",
"product": {
"name": "IBM Java SDK \u003c8.0.8.30",
"product_id": "T037186"
}
},
{
"category": "product_version",
"name": "8.0.8.30",
"product": {
"name": "IBM Java SDK 8.0.8.30",
"product_id": "T037186-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jdk:8.0.8.30"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.1.5.23",
"product": {
"name": "IBM Java SDK \u003c7.1.5.23",
"product_id": "T037187"
}
},
{
"category": "product_version",
"name": "7.1.5.23",
"product": {
"name": "IBM Java SDK 7.1.5.23",
"product_id": "T037187-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jdk:7.1.5.23"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.0.0.830",
"product": {
"name": "IBM Java SDK \u003c8.0.0.830",
"product_id": "T038890"
}
},
{
"category": "product_version",
"name": "8.0.0.830",
"product": {
"name": "IBM Java SDK 8.0.0.830",
"product_id": "T038890-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jdk:8.0.0.830"
}
}
}
],
"category": "product_name",
"name": "Java SDK"
},
{
"branches": [
{
"category": "product_version",
"name": "9.2.0-9.2.36",
"product": {
"name": "IBM License Metric Tool 9.2.0-9.2.36",
"product_id": "T037670",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:license_metric_tool:9.2.0_-_9.2.36"
}
}
}
],
"category": "product_name",
"name": "License Metric Tool"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.0.27",
"product": {
"name": "IBM Rational Build Forge \u003c8.0.0.27",
"product_id": "T038286"
}
},
{
"category": "product_version",
"name": "8.0.0.27",
"product": {
"name": "IBM Rational Build Forge 8.0.0.27",
"product_id": "T038286-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27"
}
}
}
],
"category": "product_name",
"name": "Rational Build Forge"
},
{
"branches": [
{
"category": "product_version",
"name": "9.6",
"product": {
"name": "IBM Rational Business Developer 9.6",
"product_id": "T023629",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_business_developer:9.6"
}
}
},
{
"category": "product_version",
"name": "9.7",
"product": {
"name": "IBM Rational Business Developer 9.7",
"product_id": "T023630",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_business_developer:9.7"
}
}
}
],
"category": "product_name",
"name": "Rational Business Developer"
},
{
"branches": [
{
"category": "product_version",
"name": "for multiplatforms",
"product": {
"name": "IBM TXSeries for multiplatforms",
"product_id": "T036617",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms"
}
}
}
],
"category": "product_name",
"name": "TXSeries"
},
{
"branches": [
{
"category": "product_version",
"name": "6.2.0-6.2.0.5",
"product": {
"name": "IBM Tivoli Business Service Manager 6.2.0-6.2.0.5",
"product_id": "T037680",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_business_service_manager:6.2.0_-_6.2.0.5"
}
}
}
],
"category": "product_name",
"name": "Tivoli Business Service Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "6.3.0.7",
"product": {
"name": "IBM Tivoli Monitoring 6.3.0.7",
"product_id": "342008",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Monitoring",
"product": {
"name": "IBM Tivoli Monitoring",
"product_id": "T011128",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:-"
}
}
}
],
"category": "product_name",
"name": "Tivoli Monitoring"
},
{
"branches": [
{
"category": "product_version",
"name": "8.1.0-8.1.0.35",
"product": {
"name": "IBM Tivoli Netcool/OMNIbus 8.1.0-8.1.0.35",
"product_id": "T037638",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0_-_8.1.0.35"
}
}
}
],
"category": "product_name",
"name": "Tivoli Netcool/OMNIbus"
},
{
"branches": [
{
"category": "product_version",
"name": "8.5",
"product": {
"name": "IBM WebSphere Service Registry and Repository 8.5",
"product_id": "306235",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_service_registry_and_repository:8.5"
}
}
}
],
"category": "product_name",
"name": "WebSphere Service Registry and Repository"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27267",
"product_status": {
"known_affected": [
"5121",
"T038829",
"T011128",
"T033658",
"T037638",
"T023629",
"T038741",
"T044555",
"T037670",
"T038286",
"T044912",
"T023630",
"342008",
"T036617",
"T038717",
"T037844",
"T037768",
"T038834",
"T035627",
"T037307",
"T037187",
"T037680",
"T038890",
"T037186",
"444803",
"T019704",
"306235"
]
},
"release_date": "2024-08-29T22:00:00.000+00:00",
"title": "CVE-2024-27267"
}
]
}
WID-SEC-W-2024-3518
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM SPSS ist ein umfassendes Set von Daten- und prognostischen Analyse-Tools f\u00fcr Gesch\u00e4ftsbenutzer, Analysten und Statistik-Programmierer.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM SPSS ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3518 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3518.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3518 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3518"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-11-20",
"url": "https://www.ibm.com/support/pages/node/7176769"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-11-20",
"url": "https://www.ibm.com/support/pages/node/7176770"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-11-20",
"url": "https://www.ibm.com/support/pages/node/7176771"
}
],
"source_lang": "en-US",
"title": "IBM SPSS: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-11-20T23:00:00.000+00:00",
"generator": {
"date": "2024-11-21T12:02:43.681+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3518",
"initial_release_date": "2024-11-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.5-CDS-SemeruJRE17.0.12",
"product": {
"name": "IBM SPSS \u003c8.5-CDS-SemeruJRE17.0.12",
"product_id": "T039381"
}
},
{
"category": "product_version",
"name": "8.5-CDS-SemeruJRE17.0.12",
"product": {
"name": "IBM SPSS 8.5-CDS-SemeruJRE17.0.12",
"product_id": "T039381-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spss:8.5-cds-semerujre17.0.12"
}
}
}
],
"category": "product_name",
"name": "SPSS"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2597",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM SPSS, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Zustand zu erzeugen und nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039381"
]
},
"release_date": "2024-11-20T23:00:00.000+00:00",
"title": "CVE-2023-2597"
},
{
"cve": "CVE-2024-22361",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM SPSS, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Zustand zu erzeugen und nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039381"
]
},
"release_date": "2024-11-20T23:00:00.000+00:00",
"title": "CVE-2024-22361"
},
{
"cve": "CVE-2024-27267",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM SPSS, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service-Zustand zu erzeugen und nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039381"
]
},
"release_date": "2024-11-20T23:00:00.000+00:00",
"title": "CVE-2024-27267"
}
]
}
WID-SEC-W-2024-1955
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Java SDK ist die Java Software Development Kit Portierung von IBM.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Java SDK ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1955 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1955.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1955 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1955"
},
{
"category": "external",
"summary": "IBM Java Security Update August 2024, Stand vom 2024-08-30",
"url": "https://www.ibm.com/support/pages/java-sdk-security-vulnerabilities#IBM_Security_Update_August_2024"
},
{
"category": "external",
"summary": "IBM Security Advisory",
"url": "https://www.ibm.com/support/pages/node/7165421"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168397 vom 2024-09-14",
"url": "https://www.ibm.com/support/pages/node/7168397"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168445 vom 2024-09-13",
"url": "https://www.ibm.com/support/pages/node/7168445"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168388 vom 2024-09-13",
"url": "https://www.ibm.com/support/pages/node/7168388"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168655 vom 2024-09-17",
"url": "https://www.ibm.com/support/pages/node/7168655"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7168725 vom 2024-09-17",
"url": "https://www.ibm.com/support/pages/node/7168725"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7169585 vom 2024-09-20",
"url": "https://www.ibm.com/support/pages/node/7169585"
},
{
"category": "external",
"summary": "HCL Article KB0116332 vom 2024-09-26",
"url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0116332"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173018 vom 2024-10-14",
"url": "https://www.ibm.com/support/pages/node/7173018"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7174323 vom 2024-10-29",
"url": "https://www.ibm.com/support/pages/node/7174323"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7174422 vom 2024-10-30",
"url": "https://www.ibm.com/support/pages/node/7174422"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7174636 vom 2024-11-01",
"url": "https://www.ibm.com/support/pages/node/7174636"
},
{
"category": "external",
"summary": "HCL vom 2024-11-06",
"url": "https://support.hcl-software.com/community?id=community_blog\u0026sys_id=cc4fa34493b9de100dddf87d1dba10c4"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6985269 vom 2024-11-11",
"url": "https://aix.software.ibm.com/aix/efixes/security/java_nov2024_advisory.asc"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7175763 vom 2024-11-12",
"url": "https://www.ibm.com/support/pages/node/7175763"
},
{
"category": "external",
"summary": "HCL Security Bulletin KB0117143 vom 2024-11-24",
"url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0117143"
},
{
"category": "external",
"summary": "HCL Security Bulletin vom 2024-12-05",
"url": "https://support.hcl-software.com/community?id=community_blog\u0026sys_id=1cd95e11931ad610ba9fb1566aba10ca"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183115 vom 2025-02-13",
"url": "https://www.ibm.com/support/pages/node/7183115"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7145183 vom 2025-06-24",
"url": "https://www.ibm.com/support/pages/node/7145183"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7145433 vom 2025-06-24",
"url": "https://www.ibm.com/support/pages/node/7145433"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7238163 vom 2025-06-28",
"url": "https://www.ibm.com/support/pages/node/7238163"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7240775 vom 2025-07-28",
"url": "https://www.ibm.com/support/pages/node/7240775"
}
],
"source_lang": "en-US",
"title": "IBM Java SDK: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-07-27T22:00:00.000+00:00",
"generator": {
"date": "2025-07-28T07:59:55.314+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1955",
"initial_release_date": "2024-08-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-09-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-28T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2024-12-04T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.7.0",
"product": {
"name": "HCL AppScan Enterprise \u003c10.7.0",
"product_id": "T038717"
}
},
{
"category": "product_version",
"name": "10.7.0",
"product": {
"name": "HCL AppScan Enterprise 10.7.0",
"product_id": "T038717-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:appscan_enterprise:10.7.0"
}
}
}
],
"category": "product_name",
"name": "AppScan Enterprise"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Inventory \u003c11.0.1.0",
"product": {
"name": "HCL BigFix Inventory \u003c11.0.1.0",
"product_id": "T037844"
}
},
{
"category": "product_version",
"name": "Inventory 11.0.1.0",
"product": {
"name": "HCL BigFix Inventory 11.0.1.0",
"product_id": "T037844-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:inventory__11.0.1.0"
}
}
},
{
"category": "product_version",
"name": "Compliance",
"product": {
"name": "HCL BigFix Compliance",
"product_id": "T038829",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:compliance"
}
}
},
{
"category": "product_version_range",
"name": "Compliance \u003c2.0.12",
"product": {
"name": "HCL BigFix Compliance \u003c2.0.12",
"product_id": "T038834"
}
},
{
"category": "product_version",
"name": "Compliance 2.0.12",
"product": {
"name": "HCL BigFix Compliance 2.0.12",
"product_id": "T038834-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:compliance__2.0.12"
}
}
}
],
"category": "product_name",
"name": "BigFix"
}
],
"category": "vendor",
"name": "HCL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "12.0.1.0-12.0.12.5",
"product": {
"name": "IBM App Connect Enterprise 12.0.1.0-12.0.12.5",
"product_id": "T037768",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.5"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow",
"product": {
"name": "IBM Business Automation Workflow",
"product_id": "T019704",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.4 FP1",
"product": {
"name": "IBM Cognos Analytics \u003c12.0.4 FP1",
"product_id": "T044555"
}
},
{
"category": "product_version",
"name": "12.0.4 FP1",
"product": {
"name": "IBM Cognos Analytics 12.0.4 FP1",
"product_id": "T044555-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:cognos_analytics:12.0.4_fp1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.2.4 FP6",
"product": {
"name": "IBM Cognos Analytics \u003c11.2.4 FP6",
"product_id": "T044912"
}
},
{
"category": "product_version",
"name": "11.2.4 FP6",
"product": {
"name": "IBM Cognos Analytics 11.2.4 FP6",
"product_id": "T044912-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:cognos_analytics:11.2.4_fp6"
}
}
}
],
"category": "product_name",
"name": "Cognos Analytics"
},
{
"branches": [
{
"category": "product_version",
"name": "10.0.0.0",
"product": {
"name": "IBM InfoSphere Identity Insight 10.0.0.0",
"product_id": "T033658",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_identity_insight:10.0.0.0"
}
}
},
{
"category": "product_version",
"name": "9.0.0.1",
"product": {
"name": "IBM InfoSphere Identity Insight 9.0.0.1",
"product_id": "T035627",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_identity_insight:9.0.0.1"
}
}
}
],
"category": "product_name",
"name": "InfoSphere Identity Insight"
},
{
"branches": [
{
"category": "product_version",
"name": "11.7",
"product": {
"name": "IBM InfoSphere Information Server 11.7",
"product_id": "444803",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:11.7"
}
}
}
],
"category": "product_name",
"name": "InfoSphere Information Server"
},
{
"category": "product_name",
"name": "IBM Informix",
"product": {
"name": "IBM Informix",
"product_id": "5121",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:informix:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "for zos 10.1-10.1.0.4",
"product": {
"name": "IBM Integration Bus for zos 10.1-10.1.0.4",
"product_id": "T037307",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:integration_bus:for_zos_10.1_-_10.1.0.4"
}
}
}
],
"category": "product_name",
"name": "Integration Bus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.8.30",
"product": {
"name": "IBM Java SDK \u003c8.0.8.30",
"product_id": "T037186"
}
},
{
"category": "product_version",
"name": "8.0.8.30",
"product": {
"name": "IBM Java SDK 8.0.8.30",
"product_id": "T037186-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jdk:8.0.8.30"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.1.5.23",
"product": {
"name": "IBM Java SDK \u003c7.1.5.23",
"product_id": "T037187"
}
},
{
"category": "product_version",
"name": "7.1.5.23",
"product": {
"name": "IBM Java SDK 7.1.5.23",
"product_id": "T037187-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jdk:7.1.5.23"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.0.0.830",
"product": {
"name": "IBM Java SDK \u003c8.0.0.830",
"product_id": "T038890"
}
},
{
"category": "product_version",
"name": "8.0.0.830",
"product": {
"name": "IBM Java SDK 8.0.0.830",
"product_id": "T038890-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jdk:8.0.0.830"
}
}
}
],
"category": "product_name",
"name": "Java SDK"
},
{
"branches": [
{
"category": "product_version",
"name": "9.2.0-9.2.36",
"product": {
"name": "IBM License Metric Tool 9.2.0-9.2.36",
"product_id": "T037670",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:license_metric_tool:9.2.0_-_9.2.36"
}
}
}
],
"category": "product_name",
"name": "License Metric Tool"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.0.27",
"product": {
"name": "IBM Rational Build Forge \u003c8.0.0.27",
"product_id": "T038286"
}
},
{
"category": "product_version",
"name": "8.0.0.27",
"product": {
"name": "IBM Rational Build Forge 8.0.0.27",
"product_id": "T038286-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27"
}
}
}
],
"category": "product_name",
"name": "Rational Build Forge"
},
{
"branches": [
{
"category": "product_version",
"name": "9.6",
"product": {
"name": "IBM Rational Business Developer 9.6",
"product_id": "T023629",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_business_developer:9.6"
}
}
},
{
"category": "product_version",
"name": "9.7",
"product": {
"name": "IBM Rational Business Developer 9.7",
"product_id": "T023630",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_business_developer:9.7"
}
}
}
],
"category": "product_name",
"name": "Rational Business Developer"
},
{
"branches": [
{
"category": "product_version",
"name": "for multiplatforms",
"product": {
"name": "IBM TXSeries for multiplatforms",
"product_id": "T036617",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms"
}
}
}
],
"category": "product_name",
"name": "TXSeries"
},
{
"branches": [
{
"category": "product_version",
"name": "6.2.0-6.2.0.5",
"product": {
"name": "IBM Tivoli Business Service Manager 6.2.0-6.2.0.5",
"product_id": "T037680",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_business_service_manager:6.2.0_-_6.2.0.5"
}
}
}
],
"category": "product_name",
"name": "Tivoli Business Service Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "6.3.0.7",
"product": {
"name": "IBM Tivoli Monitoring 6.3.0.7",
"product_id": "342008",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Monitoring",
"product": {
"name": "IBM Tivoli Monitoring",
"product_id": "T011128",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:-"
}
}
}
],
"category": "product_name",
"name": "Tivoli Monitoring"
},
{
"branches": [
{
"category": "product_version",
"name": "8.1.0-8.1.0.35",
"product": {
"name": "IBM Tivoli Netcool/OMNIbus 8.1.0-8.1.0.35",
"product_id": "T037638",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0_-_8.1.0.35"
}
}
}
],
"category": "product_name",
"name": "Tivoli Netcool/OMNIbus"
},
{
"branches": [
{
"category": "product_version",
"name": "8.5",
"product": {
"name": "IBM WebSphere Service Registry and Repository 8.5",
"product_id": "306235",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_service_registry_and_repository:8.5"
}
}
}
],
"category": "product_name",
"name": "WebSphere Service Registry and Repository"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27267",
"product_status": {
"known_affected": [
"5121",
"T038829",
"T011128",
"T033658",
"T037638",
"T023629",
"T038741",
"T044555",
"T037670",
"T038286",
"T044912",
"T023630",
"342008",
"T036617",
"T038717",
"T037844",
"T037768",
"T038834",
"T035627",
"T037307",
"T037187",
"T037680",
"T038890",
"T037186",
"444803",
"T019704",
"306235"
]
},
"release_date": "2024-08-29T22:00:00.000+00:00",
"title": "CVE-2024-27267"
}
]
}
suse-su-2024:3183-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-ibm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-ibm fixes the following issues:\n\n- Update to Java 8.0 Service Refresh 8 Fix Pack 30 (bsc#1228346)\n- CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination. (bsc#1228052)\n- CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling. (bsc#1228051)\n- CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow. (bsc#1228048)\n- CVE-2024-21144: Pack200 increase loading time due to improper header validation. (bsc#1228050)\n- CVE-2024-21138: Fixed an issue where excessive symbol length can lead to infinite loop. (bsc#1228047)\n- CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)\n- CVE-2024-27267: Fixed an Object Request Broker (ORB) remote denial of service. (bsc#1229224)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3183,SUSE-SLE-SDK-12-SP5-2024-3183,SUSE-SLE-SERVER-12-SP5-2024-3183",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3183-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3183-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243183-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3183-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html"
},
{
"category": "self",
"summary": "SUSE Bug 1228046",
"url": "https://bugzilla.suse.com/1228046"
},
{
"category": "self",
"summary": "SUSE Bug 1228047",
"url": "https://bugzilla.suse.com/1228047"
},
{
"category": "self",
"summary": "SUSE Bug 1228048",
"url": "https://bugzilla.suse.com/1228048"
},
{
"category": "self",
"summary": "SUSE Bug 1228050",
"url": "https://bugzilla.suse.com/1228050"
},
{
"category": "self",
"summary": "SUSE Bug 1228051",
"url": "https://bugzilla.suse.com/1228051"
},
{
"category": "self",
"summary": "SUSE Bug 1228052",
"url": "https://bugzilla.suse.com/1228052"
},
{
"category": "self",
"summary": "SUSE Bug 1228346",
"url": "https://bugzilla.suse.com/1228346"
},
{
"category": "self",
"summary": "SUSE Bug 1229224",
"url": "https://bugzilla.suse.com/1229224"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21131 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21138 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21140 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21144 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21145 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21147 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27267 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27267/"
}
],
"title": "Security update for java-1_8_0-ibm",
"tracking": {
"current_release_date": "2024-09-09T21:11:58Z",
"generator": {
"date": "2024-09-09T21:11:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3183-1",
"initial_release_date": "2024-09-09T21:11:58Z",
"revision_history": [
{
"date": "2024-09-09T21:11:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.i586",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.i586",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.i586",
"product": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.i586",
"product_id": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.i586",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.i586",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.i586",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.i586",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.i586",
"product": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.i586",
"product_id": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.i586",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.i586",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.ppc64le",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.ppc64le",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.s390",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.s390",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.s390",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.s390",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-30.126.1.s390x",
"product": {
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-30.126.1.s390x",
"product_id": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-30.126.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.s390x",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.s390x",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-30.126.1.s390x",
"product": {
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-30.126.1.s390x",
"product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-30.126.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.s390x",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.s390x",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-30.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-30.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-30.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.x86_64",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-30.126.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21131"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21131",
"url": "https://www.suse.com/security/cve/CVE-2024-21131"
},
{
"category": "external",
"summary": "SUSE Bug 1228046 for CVE-2024-21131",
"url": "https://bugzilla.suse.com/1228046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T21:11:58Z",
"details": "low"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21138"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21138",
"url": "https://www.suse.com/security/cve/CVE-2024-21138"
},
{
"category": "external",
"summary": "SUSE Bug 1228047 for CVE-2024-21138",
"url": "https://bugzilla.suse.com/1228047"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T21:11:58Z",
"details": "low"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21140"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21140",
"url": "https://www.suse.com/security/cve/CVE-2024-21140"
},
{
"category": "external",
"summary": "SUSE Bug 1228048 for CVE-2024-21140",
"url": "https://bugzilla.suse.com/1228048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T21:11:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21144"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21144",
"url": "https://www.suse.com/security/cve/CVE-2024-21144"
},
{
"category": "external",
"summary": "SUSE Bug 1228050 for CVE-2024-21144",
"url": "https://bugzilla.suse.com/1228050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T21:11:58Z",
"details": "low"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21145"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21145",
"url": "https://www.suse.com/security/cve/CVE-2024-21145"
},
{
"category": "external",
"summary": "SUSE Bug 1228051 for CVE-2024-21145",
"url": "https://bugzilla.suse.com/1228051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T21:11:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21147"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21147",
"url": "https://www.suse.com/security/cve/CVE-2024-21147"
},
{
"category": "external",
"summary": "SUSE Bug 1228052 for CVE-2024-21147",
"url": "https://bugzilla.suse.com/1228052"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T21:11:58Z",
"details": "important"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-27267",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27267"
}
],
"notes": [
{
"category": "general",
"text": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27267",
"url": "https://www.suse.com/security/cve/CVE-2024-27267"
},
{
"category": "external",
"summary": "SUSE Bug 1229224 for CVE-2024-27267",
"url": "https://bugzilla.suse.com/1229224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-30.126.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-30.126.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T21:11:58Z",
"details": "moderate"
}
],
"title": "CVE-2024-27267"
}
]
}
suse-su-2024:3162-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-ibm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-ibm fixes the following issues:\n\n- Update to Java 8.0 Service Refresh 8 Fix Pack 30 (bsc#1228346)\n- CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination. (bsc#1228052)\n- CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling. (bsc#1228051)\n- CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow. (bsc#1228048)\n- CVE-2024-21144: Pack200 increase loading time due to improper header validation. (bsc#1228050)\n- CVE-2024-21138: Fixed an issue where excessive symbol length can lead to infinite loop. (bsc#1228047)\n- CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)\n- CVE-2024-27267: Fixed an Object Request Broker (ORB) remote denial of service. (bsc#1229224)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3162,SUSE-SLE-Module-Legacy-15-SP5-2024-3162,SUSE-SLE-Module-Legacy-15-SP6-2024-3162,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3162,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3162,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3162,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3162,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3162,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3162,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3162,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3162,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3162,SUSE-Storage-7.1-2024-3162,openSUSE-SLE-15.5-2024-3162,openSUSE-SLE-15.6-2024-3162",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3162-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3162-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243162-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3162-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html"
},
{
"category": "self",
"summary": "SUSE Bug 1228046",
"url": "https://bugzilla.suse.com/1228046"
},
{
"category": "self",
"summary": "SUSE Bug 1228047",
"url": "https://bugzilla.suse.com/1228047"
},
{
"category": "self",
"summary": "SUSE Bug 1228048",
"url": "https://bugzilla.suse.com/1228048"
},
{
"category": "self",
"summary": "SUSE Bug 1228050",
"url": "https://bugzilla.suse.com/1228050"
},
{
"category": "self",
"summary": "SUSE Bug 1228051",
"url": "https://bugzilla.suse.com/1228051"
},
{
"category": "self",
"summary": "SUSE Bug 1228052",
"url": "https://bugzilla.suse.com/1228052"
},
{
"category": "self",
"summary": "SUSE Bug 1228346",
"url": "https://bugzilla.suse.com/1228346"
},
{
"category": "self",
"summary": "SUSE Bug 1229224",
"url": "https://bugzilla.suse.com/1229224"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21131 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21138 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21140 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21144 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21145 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21147 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27267 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27267/"
}
],
"title": "Security update for java-1_8_0-ibm",
"tracking": {
"current_release_date": "2024-09-06T10:18:01Z",
"generator": {
"date": "2024-09-06T10:18:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3162-1",
"initial_release_date": "2024-09-06T10:18:01Z",
"revision_history": [
{
"date": "2024-09-06T10:18:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.i586",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.i586",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.i586",
"product": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.i586",
"product_id": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.i586",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.i586",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.i586",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.i586",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.i586",
"product": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.i586",
"product_id": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.i586",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.i586",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"product_id": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le"
},
"product_reference": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x"
},
"product_reference": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
},
"product_reference": "java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21131"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21131",
"url": "https://www.suse.com/security/cve/CVE-2024-21131"
},
{
"category": "external",
"summary": "SUSE Bug 1228046 for CVE-2024-21131",
"url": "https://bugzilla.suse.com/1228046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-06T10:18:01Z",
"details": "low"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21138"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21138",
"url": "https://www.suse.com/security/cve/CVE-2024-21138"
},
{
"category": "external",
"summary": "SUSE Bug 1228047 for CVE-2024-21138",
"url": "https://bugzilla.suse.com/1228047"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-06T10:18:01Z",
"details": "low"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21140"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21140",
"url": "https://www.suse.com/security/cve/CVE-2024-21140"
},
{
"category": "external",
"summary": "SUSE Bug 1228048 for CVE-2024-21140",
"url": "https://bugzilla.suse.com/1228048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-06T10:18:01Z",
"details": "moderate"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21144"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21144",
"url": "https://www.suse.com/security/cve/CVE-2024-21144"
},
{
"category": "external",
"summary": "SUSE Bug 1228050 for CVE-2024-21144",
"url": "https://bugzilla.suse.com/1228050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-06T10:18:01Z",
"details": "low"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21145"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21145",
"url": "https://www.suse.com/security/cve/CVE-2024-21145"
},
{
"category": "external",
"summary": "SUSE Bug 1228051 for CVE-2024-21145",
"url": "https://bugzilla.suse.com/1228051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-06T10:18:01Z",
"details": "moderate"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21147"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21147",
"url": "https://www.suse.com/security/cve/CVE-2024-21147"
},
{
"category": "external",
"summary": "SUSE Bug 1228052 for CVE-2024-21147",
"url": "https://bugzilla.suse.com/1228052"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-06T10:18:01Z",
"details": "important"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-27267",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27267"
}
],
"notes": [
{
"category": "general",
"text": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27267",
"url": "https://www.suse.com/security/cve/CVE-2024-27267"
},
{
"category": "external",
"summary": "SUSE Bug 1229224 for CVE-2024-27267",
"url": "https://bugzilla.suse.com/1229224"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Enterprise Storage 7.1:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.5:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1.x86_64",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.ppc64le",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.s390x",
"openSUSE Leap 15.6:java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-06T10:18:01Z",
"details": "moderate"
}
],
"title": "CVE-2024-27267"
}
]
}
rhsa-2024_6595
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR8-FP15.\n\nSecurity Fix(es):\n\n* IBM JDK: Object Request Broker (ORB) denial of service (CVE-2023-38264)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6595",
"url": "https://access.redhat.com/errata/RHSA-2024:6595"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6595.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-ibm security update",
"tracking": {
"current_release_date": "2024-11-15T18:42:26+00:00",
"generator": {
"date": "2024-11-15T18:42:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2024:6595",
"initial_release_date": "2024-09-11T13:38:21+00:00",
"revision_history": [
{
"date": "2024-09-11T13:38:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-11T13:38:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T18:42:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Supplementary (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::supplementary"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27267",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"discovery_date": "2024-08-14T16:20:06.856996+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2304975"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in IBM SDK, Java Technology Edition. A race condition in the management of ORB listener threads can cause a remote denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ibm-java: Race condition may cause Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27267"
},
{
"category": "external",
"summary": "RHBZ#2304975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27267",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27267"
},
{
"category": "external",
"summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573"
},
{
"category": "external",
"summary": "https://www.ibm.com/support/pages/node/7165421",
"url": "https://www.ibm.com/support/pages/node/7165421"
}
],
"release_date": "2024-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-11T13:38:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6595"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ibm-java: Race condition may cause Denial of Service"
}
]
}
RHSA-2024:6595
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR8-FP15.\n\nSecurity Fix(es):\n\n* IBM JDK: Object Request Broker (ORB) denial of service (CVE-2023-38264)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6595",
"url": "https://access.redhat.com/errata/RHSA-2024:6595"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6595.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T06:18:54+00:00",
"generator": {
"date": "2025-09-26T06:18:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2024:6595",
"initial_release_date": "2024-09-11T13:38:21+00:00",
"revision_history": [
{
"date": "2024-09-11T13:38:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-11T13:38:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T06:18:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Supplementary (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::supplementary"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27267",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"discovery_date": "2024-08-14T16:20:06.856996+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2304975"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in IBM SDK, Java Technology Edition. A race condition in the management of ORB listener threads can cause a remote denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ibm-java: Race condition may cause Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27267"
},
{
"category": "external",
"summary": "RHBZ#2304975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27267",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27267"
},
{
"category": "external",
"summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573"
},
{
"category": "external",
"summary": "https://www.ibm.com/support/pages/node/7165421",
"url": "https://www.ibm.com/support/pages/node/7165421"
}
],
"release_date": "2024-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-11T13:38:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6595"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ibm-java: Race condition may cause Denial of Service"
}
]
}
rhsa-2024:6595
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR8-FP15.\n\nSecurity Fix(es):\n\n* IBM JDK: Object Request Broker (ORB) denial of service (CVE-2023-38264)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6595",
"url": "https://access.redhat.com/errata/RHSA-2024:6595"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6595.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-ibm security update",
"tracking": {
"current_release_date": "2025-09-26T06:18:54+00:00",
"generator": {
"date": "2025-09-26T06:18:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2024:6595",
"initial_release_date": "2024-09-11T13:38:21+00:00",
"revision_history": [
{
"date": "2024-09-11T13:38:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-11T13:38:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-26T06:18:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Supplementary (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::supplementary"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product_id": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.8.30-2.el8_10?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_id": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.8.30-2.el8_10?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le"
},
"product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64 as a component of Red Hat Enterprise Linux Supplementary (v. 8)",
"product_id": "Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
},
"product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64",
"relates_to_product_reference": "Supplementary-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27267",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"discovery_date": "2024-08-14T16:20:06.856996+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2304975"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in IBM SDK, Java Technology Edition. A race condition in the management of ORB listener threads can cause a remote denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ibm-java: Race condition may cause Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27267"
},
{
"category": "external",
"summary": "RHBZ#2304975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27267",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27267"
},
{
"category": "external",
"summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573"
},
{
"category": "external",
"summary": "https://www.ibm.com/support/pages/node/7165421",
"url": "https://www.ibm.com/support/pages/node/7165421"
}
],
"release_date": "2024-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-11T13:38:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6595"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-demo-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-devel-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-headless-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-jdbc-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-plugin-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.s390x",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-src-1:1.8.0.8.30-2.el8_10.x86_64",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.ppc64le",
"Supplementary-8.10.0.Z.MAIN.EUS:java-1.8.0-ibm-webstart-1:1.8.0.8.30-2.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ibm-java: Race condition may cause Denial of Service"
}
]
}
ghsa-7p73-rpm9-rwr6
Vulnerability from github
The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573.
{
"affected": [],
"aliases": [
"CVE-2024-27267"
],
"database_specific": {
"cwe_ids": [
"CWE-300",
"CWE-362"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-08-14T16:15:10Z",
"severity": "MODERATE"
},
"details": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573.",
"id": "GHSA-7p73-rpm9-rwr6",
"modified": "2024-08-14T18:32:41Z",
"published": "2024-08-14T18:32:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27267"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284573"
},
{
"type": "WEB",
"url": "https://www.ibm.com/support/pages/node/7165421"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
ncsc-2025-0064
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "IBM heeft kwetsbaarheden verholpen in IBM Cognos Controller (Versies 11.0.0 tot 11.0.1 FP3 en 11.1.0).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende in staat om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Omzeilen van een beveiligingsmaatregel\n- Manipulatie van gegevens\n- Verkrijgen van verhoogde rechten\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Toegang tot gevoelige informatie\n\nDe kwetsbaarheden bevinden zich zowel in de Cognos Controller-Applicatie zelf, als in onderliggende producten, zoals Java, Websphere Liberty, Apache Ant en diverse Open Source componenten, welke met Cognos Controller worden meegeleverd.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "IBM heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "CWE-399",
"title": "CWE-399"
},
{
"category": "general",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
},
{
"category": "general",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "XML Injection (aka Blind XPath Injection)",
"title": "CWE-91"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Insecure Temporary File",
"title": "CWE-377"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.ibm.com/support/pages/node/7183597"
}
],
"title": "Kwetsbaarheden verholpen in IBM Cognos Controller",
"tracking": {
"current_release_date": "2025-02-21T08:40:26.849797Z",
"id": "NCSC-2025-0064",
"initial_release_date": "2025-02-21T08:40:26.849797Z",
"revision_history": [
{
"date": "2025-02-21T08:40:26.849797Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cognos_controller",
"product": {
"name": "cognos_controller",
"product_id": "CSAFPID-1698100",
"product_identification_helper": {
"cpe": "cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "ibm"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11979",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"notes": [
{
"category": "other",
"text": "Insecure Temporary File",
"title": "CWE-377"
},
{
"category": "other",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-11979",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-11979.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2021-36373",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "CWE-399",
"title": "CWE-399"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36373",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-36373.json"
}
],
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "CWE-399",
"title": "CWE-399"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36374",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-36374.json"
}
],
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2022-4244",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-4244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4244.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2022-4244"
},
{
"cve": "CVE-2022-4245",
"cwe": {
"id": "CWE-91",
"name": "XML Injection (aka Blind XPath Injection)"
},
"notes": [
{
"category": "other",
"text": "XML Injection (aka Blind XPath Injection)",
"title": "CWE-91"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-4245",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4245.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2022-4245"
},
{
"cve": "CVE-2023-47160",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-47160",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2023-47160"
},
{
"cve": "CVE-2023-50314",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-50314",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50314.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2023-50314"
},
{
"cve": "CVE-2024-21131",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-27267",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "other",
"text": "Channel Accessible by Non-Endpoint",
"title": "CWE-300"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27267",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27267.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-27267"
},
{
"cve": "CVE-2024-28776",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28776",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28776.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-28776"
},
{
"cve": "CVE-2024-28777",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28777",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28777.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-28777"
},
{
"cve": "CVE-2024-28780",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28780",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28780.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-28780"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-45081",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45081",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45081.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-45081"
},
{
"cve": "CVE-2024-45084",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45084",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45084.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-45084"
},
{
"cve": "CVE-2024-52902",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1698100"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52902",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52902.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1698100"
]
}
],
"title": "CVE-2024-52902"
}
]
}
fkie_cve-2024-27267
Vulnerability from fkie_nvd
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| psirt@us.ibm.com | https://www.ibm.com/support/pages/node/7165421 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:java_technology:*:*:*",
"matchCriteriaId": "5DDFFC65-9A40-45B6-BEAB-AC2A72A0B0BD",
"versionEndIncluding": "7.1.5.18",
"versionStartIncluding": "7.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:java_technology:*:*:*",
"matchCriteriaId": "A0954E69-2308-4A9C-B786-6FB188823ED6",
"versionEndIncluding": "8.0.8.26",
"versionStartIncluding": "8.0.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads."
},
{
"lang": "es",
"value": "El Object Request Broker (ORB) en IBM SDK, Java Technology Edition 7.1.0.0 a 7.1.5.18 y 8.0.0.0 a 8.0.8.26 es vulnerable a la denegaci\u00f3n remota de servicio, provocada por una condici\u00f3n de ejecuci\u00f3n en la gesti\u00f3n de subprocesos de escucha de ORB. ID de IBM X-Force: 284573."
}
],
"id": "CVE-2024-27267",
"lastModified": "2025-09-29T17:15:29.540",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "psirt@us.ibm.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-08-14T16:15:10.950",
"references": [
{
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ibm.com/support/pages/node/7165421"
}
],
"sourceIdentifier": "psirt@us.ibm.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "psirt@us.ibm.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.