<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for java-1_8_0-openj9</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:3092-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-09-06T05:51:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-09-06T05:51:30Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-09-06T05:51:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for java-1_8_0-openj9</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for java-1_8_0-openj9 fixes the following issues:

- Updated to OpenJDK 8u345 build 01 with OpenJ9 0.33.0 virtual machine:
  - CVE-2022-34169: Fixed an integer truncation issue in the Xalan
    Java XSLT library that occurred when processing malicious
    stylesheets (bsc#1201684).
  - CVE-2022-21541: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201692).
  - CVE-2022-21540: Fixed a potential bypass of sandbox restrictions
    in the Hotspot component (bsc#1201694).

- Updated to OpenJDK 8u332 build 09 with OpenJ9 0.32.0 virtual machine:
  - CVE-2021-41041: Failed an issue that could allow unverified methods
    to be invoked using MethodHandles (bsc#1198935).
  - CVE-2022-21426: Fixed a remote partial denial of service issue
    (component: JAXP) (bsc#1198672).
  - CVE-2022-21434: Fixed an issue that could allow a remote attacker
    to update, insert or delete data (component: Libraries) (bsc#1198674).
  - CVE-2022-21443: Fixed a remote partial denial of service issue
    (component: Libraries) (bsc#1198675).
  - CVE-2022-21476: Fixed an issue that could allow unauthorized
    access to confidential data (component: Libraries) (bsc#1198671).
  - CVE-2022-21496: Fixed an issue that could allow a remote attacker
    to update, insert or delete data (component: JNDI) (bsc#1198673).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2022-3092,openSUSE-SLE-15.3-2022-3092,openSUSE-SLE-15.4-2022-3092</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      <Description>Link for SUSE-SU-2022:3092-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:3092-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198671</URL>
      <Description>SUSE Bug 1198671</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198672</URL>
      <Description>SUSE Bug 1198672</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198673</URL>
      <Description>SUSE Bug 1198673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198674</URL>
      <Description>SUSE Bug 1198674</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198675</URL>
      <Description>SUSE Bug 1198675</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1198935</URL>
      <Description>SUSE Bug 1198935</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201684</URL>
      <Description>SUSE Bug 1201684</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201692</URL>
      <Description>SUSE Bug 1201692</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201694</URL>
      <Description>SUSE Bug 1201694</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41041/</URL>
      <Description>SUSE CVE CVE-2021-41041 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-21426/</URL>
      <Description>SUSE CVE CVE-2022-21426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-21434/</URL>
      <Description>SUSE CVE CVE-2022-21434 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-21443/</URL>
      <Description>SUSE CVE CVE-2022-21443 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-21476/</URL>
      <Description>SUSE CVE CVE-2022-21476 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-21496/</URL>
      <Description>SUSE CVE CVE-2022-21496 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-21540/</URL>
      <Description>SUSE CVE CVE-2022-21540 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-21541/</URL>
      <Description>SUSE CVE CVE-2022-21541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-34169/</URL>
      <Description>SUSE CVE CVE-2022-34169 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openj9-1.8.0.345-150200.3.24.1">
      <FullProductName ProductID="java-1_8_0-openj9-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-1.8.0.345-150200.3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1">
      <FullProductName ProductID="java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1">
      <FullProductName ProductID="java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1">
      <FullProductName ProductID="java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1">
      <FullProductName ProductID="java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1">
      <FullProductName ProductID="java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1">
      <FullProductName ProductID="java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</FullProductName>
    </Branch>
    <Relationship ProductReference="java-1_8_0-openj9-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1">java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Eclipse Openj9 before version 0.32.0, Java 8 &amp; 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.</Note>
    </Notes>
    <CVE>CVE-2021-41041</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41041.html</URL>
        <Description>CVE-2021-41041</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198935</URL>
        <Description>SUSE Bug 1198935</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2022-21426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-21426.html</URL>
        <Description>CVE-2022-21426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198672</URL>
        <Description>SUSE Bug 1198672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201643</URL>
        <Description>SUSE Bug 1201643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2022-21434</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-21434.html</URL>
        <Description>CVE-2022-21434</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198674</URL>
        <Description>SUSE Bug 1198674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201643</URL>
        <Description>SUSE Bug 1201643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).</Note>
    </Notes>
    <CVE>CVE-2022-21443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-21443.html</URL>
        <Description>CVE-2022-21443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198675</URL>
        <Description>SUSE Bug 1198675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201643</URL>
        <Description>SUSE Bug 1201643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2022-21476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-21476.html</URL>
        <Description>CVE-2022-21476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198671</URL>
        <Description>SUSE Bug 1198671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201643</URL>
        <Description>SUSE Bug 1201643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).</Note>
    </Notes>
    <CVE>CVE-2022-21496</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-21496.html</URL>
        <Description>CVE-2022-21496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198673</URL>
        <Description>SUSE Bug 1198673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201643</URL>
        <Description>SUSE Bug 1201643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).</Note>
    </Notes>
    <CVE>CVE-2022-21540</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-21540.html</URL>
        <Description>CVE-2022-21540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201694</URL>
        <Description>SUSE Bug 1201694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202427</URL>
        <Description>SUSE Bug 1202427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).</Note>
    </Notes>
    <CVE>CVE-2022-21541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-21541.html</URL>
        <Description>CVE-2022-21541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201692</URL>
        <Description>SUSE Bug 1201692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202427</URL>
        <Description>SUSE Bug 1202427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.</Note>
    </Notes>
    <CVE>CVE-2022-34169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.3:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-accessibility-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-demo-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-devel-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-headless-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-javadoc-1.8.0.345-150200.3.24.1</ProductID>
        <ProductID>openSUSE Leap 15.4:java-1_8_0-openj9-src-1.8.0.345-150200.3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-20223092-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-34169.html</URL>
        <Description>CVE-2022-34169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201684</URL>
        <Description>SUSE Bug 1201684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202427</URL>
        <Description>SUSE Bug 1202427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1207688</URL>
        <Description>SUSE Bug 1207688</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
