Bug 1213482 (CVE-2023-22049)

Summary: VUL-0: CVE-2023-22049: java-11-openjdk,java-1_8_0-ibm,java-1_8_0-openjdk,java-17-openjdk: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Libraries).
Product: [Novell Products] SUSE Security Incidents Reporter: Thomas Leroy <thomas.leroy>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Minor    
Priority: P3 - Medium CC: rfrohl, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/372917/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-22049:3.7:(AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Thomas Leroy 2023-07-19 12:46:53 UTC
CVE-2023-22049

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle
GraalVM for JDK product of Oracle Java SE (component: Libraries).  Supported
versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19,
17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2;
Oracle GraalVM for JDK: 17.0.7 and  20.0.1. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to
compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for
JDK.  Successful attacks of this vulnerability can result in  unauthorized
update, insert or delete access to some of Oracle Java SE, Oracle GraalVM
Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This
vulnerability can be exploited by using APIs in the specified Component, e.g.,
through a web service which supplies data to the APIs. This vulnerability also
applies to Java deployments, typically in clients running sandboxed Java Web
Start applications or sandboxed Java applets, that load and run untrusted code
(e.g., code that comes from the internet) and rely on the Java sandbox for
security. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector:
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22049
https://www.cve.org/CVERecord?id=CVE-2023-22049
https://www.oracle.com/security-alerts/cpujul2023.html
Comment 2 Maintenance Automation 2023-07-26 16:46:57 UTC
SUSE-SU-2023:2990-1: An update that solves seven vulnerabilities can now be installed.

Category: security (important)
Bug References: 1207922, 1213473, 1213474, 1213475, 1213479, 1213481, 1213482
CVE References: CVE-2023-22006, CVE-2023-22036, CVE-2023-22041, CVE-2023-22044, CVE-2023-22045, CVE-2023-22049, CVE-2023-25193
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): java-11-openjdk-11.0.20.0-3.61.1
SUSE Linux Enterprise Server 12 SP5 (src): java-11-openjdk-11.0.20.0-3.61.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): java-11-openjdk-11.0.20.0-3.61.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Maintenance Automation 2023-07-31 08:32:28 UTC
SUSE-SU-2023:3023-1: An update that solves seven vulnerabilities can now be installed.

Category: security (important)
Bug References: 1207922, 1213473, 1213474, 1213475, 1213479, 1213481, 1213482
CVE References: CVE-2023-22006, CVE-2023-22036, CVE-2023-22041, CVE-2023-22044, CVE-2023-22045, CVE-2023-22049, CVE-2023-25193
Sources used:
openSUSE Leap 15.4 (src): java-17-openjdk-17.0.8.0-150400.3.27.1
openSUSE Leap 15.5 (src): java-17-openjdk-17.0.8.0-150400.3.27.1
Basesystem Module 15-SP4 (src): java-17-openjdk-17.0.8.0-150400.3.27.1
Basesystem Module 15-SP5 (src): java-17-openjdk-17.0.8.0-150400.3.27.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2023-08-11 12:30:22 UTC
SUSE-SU-2023:3287-1: An update that solves seven vulnerabilities can now be installed.

Category: security (important)
Bug References: 1207922, 1213473, 1213474, 1213475, 1213479, 1213481, 1213482
CVE References: CVE-2023-22006, CVE-2023-22036, CVE-2023-22041, CVE-2023-22044, CVE-2023-22045, CVE-2023-22049, CVE-2023-25193
Sources used:
openSUSE Leap 15.4 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
openSUSE Leap 15.5 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
Basesystem Module 15-SP4 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
Basesystem Module 15-SP5 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Package Hub 15 15-SP4 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Package Hub 15 15-SP5 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Manager Proxy 4.2 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Manager Retail Branch Server 4.2 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Manager Server 4.2 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE Enterprise Storage 7.1 (src): java-11-openjdk-11.0.20.0-150000.3.99.1
SUSE CaaS Platform 4.0 (src): java-11-openjdk-11.0.20.0-150000.3.99.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-08-16 12:30:08 UTC
SUSE-SU-2023:3332-1: An update that solves two vulnerabilities can now be installed.

Category: security (low)
Bug References: 1213481, 1213482
CVE References: CVE-2023-22045, CVE-2023-22049
Sources used:
openSUSE Leap 15.4 (src): java-1_8_0-openj9-1.8.0.382-150200.3.36.1
openSUSE Leap 15.5 (src): java-1_8_0-openj9-1.8.0.382-150200.3.36.1
SUSE Package Hub 15 15-SP5 (src): java-1_8_0-openj9-1.8.0.382-150200.3.36.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Maintenance Automation 2023-08-28 08:30:04 UTC
SUSE-SU-2023:3441-1: An update that solves eight vulnerabilities and has two fixes can now be installed.

Category: security (important)
Bug References: 1207922, 1213473, 1213474, 1213475, 1213479, 1213481, 1213482, 1213541, 1213934, 1214431
CVE References: CVE-2022-40609, CVE-2023-22006, CVE-2023-22036, CVE-2023-22041, CVE-2023-22044, CVE-2023-22045, CVE-2023-22049, CVE-2023-25193
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2023-08-28 12:30:43 UTC
SUSE-SU-2023:3443-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1213481, 1213482
CVE References: CVE-2023-22045, CVE-2023-22049
Sources used:
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (src): java-1_8_0-openjdk-1.8.0.382-27.90.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): java-1_8_0-openjdk-1.8.0.382-27.90.1
SUSE Linux Enterprise Server 12 SP5 (src): java-1_8_0-openjdk-1.8.0.382-27.90.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): java-1_8_0-openjdk-1.8.0.382-27.90.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2023-08-28 12:30:45 UTC
SUSE-SU-2023:3442-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1213481, 1213482
CVE References: CVE-2023-22045, CVE-2023-22049
Sources used:
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Enterprise Storage 7.1 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE CaaS Platform 4.0 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
openSUSE Leap 15.4 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
openSUSE Leap 15.5 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
Legacy Module 15-SP4 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
Legacy Module 15-SP5 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): java-1_8_0-openjdk-1.8.0.382-150000.3.82.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Fridrich Strba 2024-03-05 08:46:01 UTC
This one is for closing.
Comment 14 Robert Frohl 2024-05-22 11:02:20 UTC
done, closing