Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2021-35550 CVE-2021-35556 CVE-2021-35559 CVE-2021-35561 CVE-2021-35564 CVE-2021-35565 CVE-2021-35567 CVE-2021-35578 CVE-2021-35586 CVE-2021-35588 CVE-2021-35603 |
CWE-ID | CWE-300 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Module for Legacy Software Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Operating systems & Components / Operating system SUSE Enterprise Storage Operating systems & Components / Operating system SUSE CaaS Platform Operating systems & Components / Operating system SUSE Linux Enterprise Server Operating systems & Components / Operating system java-1_8_0-openjdk-headless-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openjdk-headless Operating systems & Components / Operating system package or component java-1_8_0-openjdk-devel-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openjdk-devel Operating systems & Components / Operating system package or component java-1_8_0-openjdk-demo-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openjdk-demo Operating systems & Components / Operating system package or component java-1_8_0-openjdk-debugsource Operating systems & Components / Operating system package or component java-1_8_0-openjdk-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openjdk Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU57487
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35550
CWE-ID:
CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to the JSSE component in Oracle GraalVM Enterprise Edition offers cipher suites in the wrong way, which causes weaker cipher suites to be offered ahead of the strong ones. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57491
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35556
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Swing component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57492
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35559
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Swing component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57493
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35561
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Utility component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57490
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35564
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Keytool component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57494
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35565
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57486
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35567
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote authenticated user can exploit this vulnerability to gain access to sensitive information.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57495
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35578
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition when processing TLS 1.3 ClientHello packets. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57489
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-35586
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the ImageIO component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57497
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-35588
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU57496
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-35603
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationUpdate the affected package java-1_8_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Module for Legacy Software: 15-SP2 - 15-SP3
SUSE Linux Enterprise Server for SAP: 15-SP1 - 15
SUSE Enterprise Storage: 6
SUSE CaaS Platform: 4.0
SUSE Linux Enterprise Server: 15-LTSS - 15-SP1-LTSS
java-1_8_0-openjdk-headless-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-headless: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-devel: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-demo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debugsource: before 1.8.0.312-3.58.2
java-1_8_0-openjdk-debuginfo: before 1.8.0.312-3.58.2
java-1_8_0-openjdk: before 1.8.0.312-3.58.2
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213770-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.