Lucene search

K
suseSuseOPENSUSE-SU-2021:3615-1
HistoryNov 04, 2021 - 12:00 a.m.

Security update for java-1_8_0-openj9 (important)

2021-11-0400:00:00
lists.opensuse.org
34

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:C/I:N/A:N

An update that fixes 15 vulnerabilities is now available.

Description:

This update for java-1_8_0-openj9 fixes the following issues:

Update to OpenJDK 8u312 build 07 with OpenJ9 0.29.0 virtual machine
including Oracle July 2021 and October 2021 CPU changes

  • CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in
    ProcessBuilder on Windows (bsc#1185056).
  • CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled
    algorithms (bsc#1185055).
  • CVE-2021-2341: Fixed flaw inside the FtpClient (bsc#1188564).
  • CVE-2021-2369: Fixed JAR file handling problem containing multiple
    MANIFEST.MF files (bsc#1188565).
  • CVE-2021-2388: Fixed flaw inside the Hotspot component performed range
    check elimination (bsc#1188566).
  • CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS
    (bsc#1191901).
  • CVE-2021-35556: Fixed excessive memory allocation in RTFParser
    (bsc#1191910).
  • CVE-2021-35559: Fixed excessive memory allocation in RTFReader
    (bsc#1191911).
  • CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet
    (bsc#1191912).
  • CVE-2021-35564: Fixed certificates with end dates too far in the future
    can corrupt keystore (bsc#1191913).
  • CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session
    close (bsc#1191909).
  • CVE-2021-35567: Fixed incorrect principal selection when using Kerberos
    Constrained Delegation (bsc#1191903).
  • CVE-2021-35578: Fixed unexpected exception raised during TLS handshake
    (bsc#1191904).
  • CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader
    (bsc#1191914).
  • CVE-2021-35603: Fixed non-constant comparison during TLS handshakes
    (bsc#1191906).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2021-3615=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.3ppc64le< - openSUSE Leap 15.3 (ppc64le s390x x86_64):- openSUSE Leap 15.3 (ppc64le s390x x86_64):.ppc64le.rpm
openSUSE Leap15.3s390x< - openSUSE Leap 15.3 (ppc64le s390x x86_64):- openSUSE Leap 15.3 (ppc64le s390x x86_64):.s390x.rpm
openSUSE Leap15.3x86_64< - openSUSE Leap 15.3 (ppc64le s390x x86_64):- openSUSE Leap 15.3 (ppc64le s390x x86_64):.x86_64.rpm
openSUSE Leap15.3noarch< - openSUSE Leap 15.3 (noarch):- openSUSE Leap 15.3 (noarch):.noarch.rpm

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:C/I:N/A:N