OPENSUSE-SU-2026:20680-1
Vulnerability from csaf_opensuse - Published: 2026-05-05 15:49 - Updated: 2026-05-05 15:49Summary
Security update for java-17-openjdk
Severity
Important
Notes
Title of the patch: Security update for java-17-openjdk
Description of the patch: This update for java-17-openjdk fixes the following issues:
Upgrade to upstream tag jdk-17.0.19+10 (April 2026 CPU).
Security issues fixed:
- CVE-2026-22007: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain
unauthorized read access to a subset of accessible data (bsc#1262490).
- CVE-2026-22013: JGSS: unauthenticated attacker with network access via multiple protocols can gain unauthorized
access to critical data (bsc#1262494).
- CVE-2026-22016: JAXP: unauthenticated attacker with network access via multiple protocols can gain unauthorized
to access critical data (bsc#1262495).
- CVE-2026-22018: Libraries: unauthenticated attacker with network access via multiple protocols can cause a partial
denial of service (bsc#1262496).
- CVE-2026-22021: JSSE: unauthenticated attacker with network access via HTTPS can cause a partial denial of service
(bsc#1262497).
- CVE-2026-23865: freetype2: integer overflow in the `tt_var_load_item_variation_store` function allows for an
out-of-bounds read when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts(bsc#1259118).
- CVE-2026-34268: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain
unauthorized read access to a subset of data (bsc#1262500).
- CVE-2026-34282: Networking: unauthenticated attacker with network access via multiple protocols can cause a hang or
frequently repeatable crash (bsc#1262501).
Other updates and bugfixes:
- Provide the timezone-java and tzdata-java (jsc#PED-15898).
Patchnames: openSUSE-Leap-16.0-683
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-17-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-17-openjdk fixes the following issues:\n\nUpgrade to upstream tag jdk-17.0.19+10 (April 2026 CPU).\n\nSecurity issues fixed:\n\n- CVE-2026-22007: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain\n unauthorized read access to a subset of accessible data (bsc#1262490).\n- CVE-2026-22013: JGSS: unauthenticated attacker with network access via multiple protocols can gain unauthorized\n access to critical data (bsc#1262494).\n- CVE-2026-22016: JAXP: unauthenticated attacker with network access via multiple protocols can gain unauthorized\n to access critical data (bsc#1262495).\n- CVE-2026-22018: Libraries: unauthenticated attacker with network access via multiple protocols can cause a partial\n denial of service (bsc#1262496).\n- CVE-2026-22021: JSSE: unauthenticated attacker with network access via HTTPS can cause a partial denial of service\n (bsc#1262497).\n- CVE-2026-23865: freetype2: integer overflow in the `tt_var_load_item_variation_store` function allows for an\n out-of-bounds read when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts(bsc#1259118).\n- CVE-2026-34268: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain\n unauthorized read access to a subset of data (bsc#1262500).\n- CVE-2026-34282: Networking: unauthenticated attacker with network access via multiple protocols can cause a hang or\n frequently repeatable crash (bsc#1262501).\n\nOther updates and bugfixes:\n\n- Provide the timezone-java and tzdata-java (jsc#PED-15898).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-683",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20680-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1259118",
"url": "https://bugzilla.suse.com/1259118"
},
{
"category": "self",
"summary": "SUSE Bug 1262490",
"url": "https://bugzilla.suse.com/1262490"
},
{
"category": "self",
"summary": "SUSE Bug 1262494",
"url": "https://bugzilla.suse.com/1262494"
},
{
"category": "self",
"summary": "SUSE Bug 1262495",
"url": "https://bugzilla.suse.com/1262495"
},
{
"category": "self",
"summary": "SUSE Bug 1262496",
"url": "https://bugzilla.suse.com/1262496"
},
{
"category": "self",
"summary": "SUSE Bug 1262497",
"url": "https://bugzilla.suse.com/1262497"
},
{
"category": "self",
"summary": "SUSE Bug 1262500",
"url": "https://bugzilla.suse.com/1262500"
},
{
"category": "self",
"summary": "SUSE Bug 1262501",
"url": "https://bugzilla.suse.com/1262501"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22007 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22007/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22013 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22016 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22018 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23865 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34268 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34282 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34282/"
}
],
"title": "Security update for java-17-openjdk",
"tracking": {
"current_release_date": "2026-05-05T15:49:16Z",
"generator": {
"date": "2026-05-05T15:49:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20680-1",
"initial_release_date": "2026-05-05T15:49:16Z",
"revision_history": [
{
"date": "2026-05-05T15:49:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"product": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"product_id": "java-17-openjdk-17.0.19.0-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"product": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"product_id": "java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"product": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"product_id": "java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"product": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"product_id": "java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"product": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"product_id": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"product": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"product_id": "java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"product": {
"name": "java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"product_id": "java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"product": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"product_id": "java-17-openjdk-17.0.19.0-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"product": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"product_id": "java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"product": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"product_id": "java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"product": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"product_id": "java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"product": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"product_id": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"product": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"product_id": "java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"product": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"product_id": "java-17-openjdk-17.0.19.0-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"product": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"product_id": "java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"product": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"product_id": "java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"product": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"product_id": "java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"product": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"product_id": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"product": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"product_id": "java-17-openjdk-src-17.0.19.0-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"product": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"product_id": "java-17-openjdk-17.0.19.0-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"product": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"product_id": "java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"product": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"product_id": "java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"product": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"product_id": "java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"product": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"product_id": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64",
"product": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64",
"product_id": "java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64"
},
"product_reference": "java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le"
},
"product_reference": "java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x"
},
"product_reference": "java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-17.0.19.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64"
},
"product_reference": "java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64"
},
"product_reference": "java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le"
},
"product_reference": "java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x"
},
"product_reference": "java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64"
},
"product_reference": "java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64"
},
"product_reference": "java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le"
},
"product_reference": "java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x"
},
"product_reference": "java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64"
},
"product_reference": "java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64"
},
"product_reference": "java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le"
},
"product_reference": "java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x"
},
"product_reference": "java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64"
},
"product_reference": "java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch"
},
"product_reference": "java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64"
},
"product_reference": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le"
},
"product_reference": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x"
},
"product_reference": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64"
},
"product_reference": "java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64"
},
"product_reference": "java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le"
},
"product_reference": "java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x"
},
"product_reference": "java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
},
"product_reference": "java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-22007",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22007"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22007",
"url": "https://www.suse.com/security/cve/CVE-2026-22007"
},
{
"category": "external",
"summary": "SUSE Bug 1262490 for CVE-2026-22007",
"url": "https://bugzilla.suse.com/1262490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "low"
}
],
"title": "CVE-2026-22007"
},
{
"cve": "CVE-2026-22013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22013"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22013",
"url": "https://www.suse.com/security/cve/CVE-2026-22013"
},
{
"category": "external",
"summary": "SUSE Bug 1262494 for CVE-2026-22013",
"url": "https://bugzilla.suse.com/1262494"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "moderate"
}
],
"title": "CVE-2026-22013"
},
{
"cve": "CVE-2026-22016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22016"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22016",
"url": "https://www.suse.com/security/cve/CVE-2026-22016"
},
{
"category": "external",
"summary": "SUSE Bug 1262495 for CVE-2026-22016",
"url": "https://bugzilla.suse.com/1262495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "important"
}
],
"title": "CVE-2026-22016"
},
{
"cve": "CVE-2026-22018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22018"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22018",
"url": "https://www.suse.com/security/cve/CVE-2026-22018"
},
{
"category": "external",
"summary": "SUSE Bug 1262496 for CVE-2026-22018",
"url": "https://bugzilla.suse.com/1262496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "low"
}
],
"title": "CVE-2026-22018"
},
{
"cve": "CVE-2026-22021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22021"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22021",
"url": "https://www.suse.com/security/cve/CVE-2026-22021"
},
{
"category": "external",
"summary": "SUSE Bug 1262497 for CVE-2026-22021",
"url": "https://bugzilla.suse.com/1262497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "moderate"
}
],
"title": "CVE-2026-22021"
},
{
"cve": "CVE-2026-23865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23865"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23865",
"url": "https://www.suse.com/security/cve/CVE-2026-23865"
},
{
"category": "external",
"summary": "SUSE Bug 1259118 for CVE-2026-23865",
"url": "https://bugzilla.suse.com/1259118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "moderate"
}
],
"title": "CVE-2026-23865"
},
{
"cve": "CVE-2026-34268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34268"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34268",
"url": "https://www.suse.com/security/cve/CVE-2026-34268"
},
{
"category": "external",
"summary": "SUSE Bug 1262500 for CVE-2026-34268",
"url": "https://bugzilla.suse.com/1262500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "low"
}
],
"title": "CVE-2026-34268"
},
{
"cve": "CVE-2026-34282",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34282"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34282",
"url": "https://www.suse.com/security/cve/CVE-2026-34282"
},
{
"category": "external",
"summary": "SUSE Bug 1262501 for CVE-2026-34282",
"url": "https://bugzilla.suse.com/1262501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-demo-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-devel-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-headless-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-javadoc-17.0.19.0-160000.1.1.noarch",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-jmods-17.0.19.0-160000.1.1.x86_64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.aarch64",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.ppc64le",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.s390x",
"openSUSE Leap 16.0:java-17-openjdk-src-17.0.19.0-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-05T15:49:16Z",
"details": "important"
}
],
"title": "CVE-2026-34282"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…