Risk | High |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2023-21930 CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 CVE-2023-21954 CVE-2023-21967 CVE-2023-21968 CVE-2023-2597 |
CWE-ID | CWE-20 CWE-125 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #4 is available. |
Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Package Hub 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system java-1_8_0-openj9-javadoc Operating systems & Components / Operating system package or component java-1_8_0-openj9-src Operating systems & Components / Operating system package or component java-1_8_0-openj9-headless-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openj9-devel Operating systems & Components / Operating system package or component java-1_8_0-openj9-headless Operating systems & Components / Operating system package or component java-1_8_0-openj9-demo-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openj9-debugsource Operating systems & Components / Operating system package or component java-1_8_0-openj9-demo Operating systems & Components / Operating system package or component java-1_8_0-openj9-devel-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openj9-debuginfo Operating systems & Components / Operating system package or component java-1_8_0-openj9 Operating systems & Components / Operating system package or component java-1_8_0-openj9-accessibility Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU75260
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21930
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75267
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-21937
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Networking component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75265
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-21938
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75264
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2023-21939
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Swing component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU75262
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21954
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75261
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-21967
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75266
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-21968
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The vulnerability exists due to improper input validation within the Libraries component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to manipulate data.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU76906
Risk: High
CVSSv4.0: 6.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-2597
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to in the implementation of the shared cache (which is enabled by default in OpenJ9 builds) the size of a string is not properly checked against the size of the buffer. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package java-1_8_0-openj9 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Package Hub 15: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
SUSE Linux Enterprise Desktop 15: SP5
openSUSE Leap: 15.4 - 15.5
java-1_8_0-openj9-javadoc: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-src: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-headless: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debugsource: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-demo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-devel-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-debuginfo: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9: before 1.8.0.372-150200.3.33.2
java-1_8_0-openj9-accessibility: before 1.8.0.372-150200.3.33.2
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20233305-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.