Bug 1204480 (CVE-2022-39399) - VUL-0: CVE-2022-39399: java-11-openjdk,java-17-openjdk: unauthenticated attacker with network access via HTTP can compromise Oracle Java SE, Oracle GraalVM Enterprise Edition
Summary: VUL-0: CVE-2022-39399: java-11-openjdk,java-17-openjdk: unauthenticated attac...
Status: RESOLVED FIXED
Alias: CVE-2022-39399
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/345660/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-39399:3.7:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-10-19 09:19 UTC by Carlos López
Modified: 2024-05-03 08:58 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-10-19 09:19:41 UTC
CVE-2022-39399

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Networking). Supported versions that are affected
are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition:
20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via HTTP to compromise Oracle Java
SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability
can result in unauthorized update, insert or delete access to some of Oracle
Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This
vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely on the
Java sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code (e.g.,
code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39399
https://www.oracle.com/security-alerts/cpuoct2022.html
https://www.cve.org/CVERecord?id=CVE-2022-39399
Comment 4 Swamp Workflow Management 2022-11-18 20:33:21 UTC
SUSE-SU-2022:4078-1: An update that solves 6 vulnerabilities and has two fixes is now available.

Category: security (moderate)
Bug References: 1203476,1204468,1204471,1204472,1204473,1204475,1204480,1204523
CVE References: CVE-2022-21618,CVE-2022-21619,CVE-2022-21624,CVE-2022-21626,CVE-2022-21628,CVE-2022-39399
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
openSUSE Leap 15.3 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Manager Server 4.1 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Manager Retail Branch Server 4.1 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Manager Proxy 4.1 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server for SAP 15 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server 15-SP2-BCL (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server 15-SP1-BCL (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Server 15-LTSS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Enterprise Storage 7 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE Enterprise Storage 6 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2
SUSE CaaS Platform 4.0 (src):    java-11-openjdk-11.0.17.0-150000.3.86.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2022-11-18 20:35:57 UTC
SUSE-SU-2022:4080-1: An update that solves 6 vulnerabilities and has two fixes is now available.

Category: security (moderate)
Bug References: 1203476,1204468,1204471,1204472,1204473,1204475,1204480,1204523
CVE References: CVE-2022-21618,CVE-2022-21619,CVE-2022-21624,CVE-2022-21626,CVE-2022-21628,CVE-2022-39399
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    java-11-openjdk-11.0.17.0-3.49.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2022-11-18 20:37:12 UTC
SUSE-SU-2022:4079-1: An update that solves 5 vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1203476,1204468,1204472,1204473,1204475,1204480
CVE References: CVE-2022-21618,CVE-2022-21619,CVE-2022-21624,CVE-2022-21628,CVE-2022-39399
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    java-17-openjdk-17.0.5.0-150400.3.6.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    java-17-openjdk-17.0.5.0-150400.3.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2022-11-22 14:27:09 UTC
SUSE-SU-2022:4166-1: An update that solves 10 vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 1201684,1201685,1201692,1201694,1202427,1204468,1204471,1204472,1204473,1204475,1204480,1205302
CVE References: CVE-2022-21540,CVE-2022-21541,CVE-2022-21549,CVE-2022-21618,CVE-2022-21619,CVE-2022-21624,CVE-2022-21626,CVE-2022-21628,CVE-2022-34169,CVE-2022-39399
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
openSUSE Leap 15.3 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Manager Server 4.1 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Manager Retail Branch Server 4.1 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Manager Proxy 4.1 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Server for SAP 15 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Server 15-LTSS (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Linux Enterprise Module for Legacy Software 15-SP3 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Enterprise Storage 7 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE Enterprise Storage 6 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1
SUSE CaaS Platform 4.0 (src):    java-1_8_0-ibm-1.8.0_sr7.20-150000.3.65.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2022-11-29 20:39:35 UTC
SUSE-SU-2022:4290-1: An update that solves 6 vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1204468,1204471,1204472,1204473,1204475,1204480,1205302
CVE References: CVE-2022-21618,CVE-2022-21619,CVE-2022-21624,CVE-2022-21626,CVE-2022-21628,CVE-2022-39399
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
SUSE OpenStack Cloud 9 (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
SUSE Linux Enterprise Server 12-SP5 (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    java-1_8_0-ibm-1.8.0_sr7.20-30.99.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Fridrich Strba 2024-03-04 11:57:53 UTC
Time to close.
Comment 11 Robert Frohl 2024-05-03 08:58:35 UTC
done, closing