{"affected":[{"ecosystem_specific":{"binaries":[{"java-1_8_0-openj9":"1.8.0.312-3.18.2","java-1_8_0-openj9-accessibility":"1.8.0.312-3.18.2","java-1_8_0-openj9-demo":"1.8.0.312-3.18.2","java-1_8_0-openj9-devel":"1.8.0.312-3.18.2","java-1_8_0-openj9-headless":"1.8.0.312-3.18.2","java-1_8_0-openj9-javadoc":"1.8.0.312-3.18.2","java-1_8_0-openj9-src":"1.8.0.312-3.18.2"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"java-1_8_0-openj9","purl":"pkg:rpm/opensuse/java-1_8_0-openj9&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0.312-3.18.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for java-1_8_0-openj9 fixes the following issues:\n\nUpdate to OpenJDK 8u312 build 07 with OpenJ9 0.29.0 virtual machine including\nOracle July 2021 and October 2021 CPU changes\n\n- CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder on Windows (bsc#1185056).\n- CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).\n- CVE-2021-2341: Fixed flaw inside the FtpClient (bsc#1188564).\n- CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files (bsc#1188565).\n- CVE-2021-2388: Fixed flaw inside the Hotspot component performed range check elimination (bsc#1188566).\n- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).\n- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).\n- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).\n- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).\n- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).\n- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).\n- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).\n- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).\n- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).\n- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).\n","id":"openSUSE-SU-2021:3615-1","modified":"2021-11-04T11:27:51Z","published":"2021-11-04T11:27:51Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191909"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191910"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191913"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-2161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-2163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-2341"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-2369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-2388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35550"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35556"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35561"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35565"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35567"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35578"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35586"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35603"}],"related":["CVE-2021-2161","CVE-2021-2163","CVE-2021-2341","CVE-2021-2369","CVE-2021-2388","CVE-2021-35550","CVE-2021-35556","CVE-2021-35559","CVE-2021-35561","CVE-2021-35564","CVE-2021-35565","CVE-2021-35567","CVE-2021-35578","CVE-2021-35586","CVE-2021-35603"],"summary":"Security update for java-1_8_0-openj9","upstream":["CVE-2021-2161","CVE-2021-2163","CVE-2021-2341","CVE-2021-2369","CVE-2021-2388","CVE-2021-35550","CVE-2021-35556","CVE-2021-35559","CVE-2021-35561","CVE-2021-35564","CVE-2021-35565","CVE-2021-35567","CVE-2021-35578","CVE-2021-35586","CVE-2021-35603"]}