{"affected":[{"ecosystem_specific":{"binaries":[{"java-11-openjdk":"11.0.14.0-3.40.4","java-11-openjdk-demo":"11.0.14.0-3.40.4","java-11-openjdk-devel":"11.0.14.0-3.40.4","java-11-openjdk-headless":"11.0.14.0-3.40.4"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"java-11-openjdk","purl":"pkg:rpm/suse/java-11-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11.0.14.0-3.40.4"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-11-openjdk":"11.0.14.0-3.40.4","java-11-openjdk-demo":"11.0.14.0-3.40.4","java-11-openjdk-devel":"11.0.14.0-3.40.4","java-11-openjdk-headless":"11.0.14.0-3.40.4"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"java-11-openjdk","purl":"pkg:rpm/suse/java-11-openjdk&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"11.0.14.0-3.40.4"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for java-11-openjdk fixes the following issues:\n\n- CVE-2022-21248: Fixed incomplete deserialization class filtering in ObjectInputStream. (bnc#1194926)\n- CVE-2022-21277: Fixed incorrect reading of TIFF files in TIFFNullDecompressor. (bnc#1194930)\n- CVE-2022-21282: Fixed Insufficient URI checks in the XSLT TransformerImpl. (bnc#1194933)\n- CVE-2022-21283: Fixed unexpected exception thrown in regex Pattern. (bnc#1194937)\n- CVE-2022-21291: Fixed Incorrect marking of writeable fields. (bnc#1194925)\n- CVE-2022-21293: Fixed Incomplete checks of StringBuffer and StringBuilder during deserialization. (bnc#1194935)\n- CVE-2022-21294: Fixed Incorrect IdentityHashMap size checks during deserialization. (bnc#1194934)\n- CVE-2022-21296: Fixed Incorrect access checks in XMLEntityManager. (bnc#1194932)\n- CVE-2022-21299: Fixed Infinite loop related to incorrect handling of newlines in XMLEntityScanner. (bnc#1194931)\n- CVE-2022-21305: Fixed Array indexing issues in LIRGenerator. (bnc#1194939)\n- CVE-2022-21340: Fixed Excessive resource use when reading JAR manifest attributes. (bnc#1194940)\n- CVE-2022-21341: Fixed OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream. (bnc#1194941)\n- CVE-2022-21360: Fixed Excessive memory allocation in BMPImageReader. (bnc#1194929)\n- CVE-2022-21365: Fixed Integer overflow in BMPImageReader. (bnc#1194928)\n- CVE-2022-21366: Fixed Excessive memory allocation in TIFF*Decompressor. (bnc#1194927)\n","id":"SUSE-SU-2022:0730-1","modified":"2022-03-04T13:47:05Z","published":"2022-03-04T13:47:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20220730-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194925"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194927"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194933"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194939"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21248"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21291"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21294"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21299"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21305"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21340"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21341"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21366"}],"related":["CVE-2022-21248","CVE-2022-21277","CVE-2022-21282","CVE-2022-21283","CVE-2022-21291","CVE-2022-21293","CVE-2022-21294","CVE-2022-21296","CVE-2022-21299","CVE-2022-21305","CVE-2022-21340","CVE-2022-21341","CVE-2022-21360","CVE-2022-21365","CVE-2022-21366"],"summary":"Security update for java-11-openjdk","upstream":["CVE-2022-21248","CVE-2022-21277","CVE-2022-21282","CVE-2022-21283","CVE-2022-21291","CVE-2022-21293","CVE-2022-21294","CVE-2022-21296","CVE-2022-21299","CVE-2022-21305","CVE-2022-21340","CVE-2022-21341","CVE-2022-21360","CVE-2022-21365","CVE-2022-21366"]}