

SUSE Linux Enterprise Module for Legacy 15 SP2 SUSE Linux Enterprise High Performance Computing 15 SP2

Patchnames: SUSE Linux Enterprise Module for Legacy 15 SP1 GA java-1_8_0-ibm-1.8.0_sr5.30-3.16.2 SUSE Linux Enterprise Server for SAP Applications 15 SP1 SUSE Linux Enterprise Module for Legacy 15 SP1 SUSE Linux Enterprise High Performance Computing 15 SP1 Patchnames: SUSE Linux Enterprise High Performance Computing 12 SP5 GA java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 SUSE Linux Enterprise High Performance Computing 12 SP5 GA java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 SUSE Linux Enterprise High Performance Computing 12 SP5
#JAVA SE DEVELOPMENT KIT 10 VS 8U152 SOFTWARE#
Patchnames: SUSE Linux Enterprise Software Development Kit 12 SP4 GA java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 SUSE Linux Enterprise Software Development Kit 12 SP4 GA java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 SUSE Linux Enterprise Software Development Kit 12 SP4 SUSE Linux Enterprise Server for SAP Applications 12 SP4 SUSE Linux Enterprise Software Development Kit 12 SP3 SUSE Linux Enterprise Software Development Kit 11 SP4 Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production Image SLES15-SP4-SAP-Azure-LI-BYOS-Production Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production Image SLES15-SP3-SAP-Azure-LI-BYOS-Production Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production Image SLES15-SP2-SAP-Azure-LI-BYOS-Production Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production Image SLES15-SP1-SAP-Azure-LI-BYOS-Production Image SLES15-SAP-Azure-VLI-BYOS-Production Image SLES15-SAP-Azure-LI-BYOS-Production Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production

Image SLES12-SP5-SAP-Azure-LI-BYOS-Production Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production Image SLES12-SP4-SAP-Azure-LI-BYOS-Production This issue is currently rated as having important severity. Overall state of this security issue: Running CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. Note: Applies to client and server deployment of Java. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152 Java SE Embedded: 8u152 JRockit: R28.3.17. Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security).
