Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU12911
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-3639
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to race conditions in CPU cache processing. A local attacker can conduct a side-channel attack to exploit a flaw in the speculative execution of Load and Store instructions to read privileged memory.
Note: the vulnerability is referred to as "Spectre variant 4".
Update the affected package java-1_7_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP5
java-1_7_0-openjdk-headless-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-headless: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debugsource: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk: before 1.7.0.311-43.50.2
http://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU52448
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-2161
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the java.lang.ProcessBuilder API on the Windows platform. A remote attacker can manipulate the Process command line and execute arbitrary code on the target system.
Update the affected package java-1_7_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP5
java-1_7_0-openjdk-headless-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-headless: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debugsource: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk: before 1.7.0.311-43.50.2
http://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU52449
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-2163
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected package java-1_7_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP5
java-1_7_0-openjdk-headless-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-headless: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debugsource: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk: before 1.7.0.311-43.50.2
http://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU55060
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-2341
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Networking component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationUpdate the affected package java-1_7_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP5
java-1_7_0-openjdk-headless-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-headless: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debugsource: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk: before 1.7.0.311-43.50.2
http://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU55058
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-2369
CWE-ID:
CWE-347 - Improper Verification of Cryptographic Signature
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error in JAR validation implementation. A remote attacker can modify the signed JAR file in a way it will be considered as signed.
Update the affected package java-1_7_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP5
java-1_7_0-openjdk-headless-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-headless: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debugsource: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk: before 1.7.0.311-43.50.2
http://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU55059
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-2432
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the JNDI component in Java SE. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
MitigationUpdate the affected package java-1_7_0-openjdk to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP5
java-1_7_0-openjdk-headless-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-headless: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-devel: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-demo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debugsource: before 1.7.0.311-43.50.2
java-1_7_0-openjdk-debuginfo: before 1.7.0.311-43.50.2
java-1_7_0-openjdk: before 1.7.0.311-43.50.2
http://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?