SUSE-SU-2024:2766-1: important: Security update for java-1_8_0-openjdk

SLE-SECURITY-UPDATES null at suse.de
Tue Aug 20 12:30:55 UTC 2024



# Security update for java-1_8_0-openjdk

Announcement ID: SUSE-SU-2024:2766-1  
Rating: important  
References:

  * bsc#1228046
  * bsc#1228047
  * bsc#1228048
  * bsc#1228050
  * bsc#1228051
  * bsc#1228052

  
Cross-References:

  * CVE-2024-21131
  * CVE-2024-21138
  * CVE-2024-21140
  * CVE-2024-21144
  * CVE-2024-21145
  * CVE-2024-21147

  
CVSS scores:

  * CVE-2024-21131 ( SUSE ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-21138 ( SUSE ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-21140 ( SUSE ):  4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  * CVE-2024-21144 ( SUSE ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-21145 ( SUSE ):  4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  * CVE-2024-21147 ( SUSE ):  7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves six vulnerabilities can now be installed.

## Description:

This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u422 (icedtea-3.32.0)

  * Security fixes
  * JDK-8314794, CVE-2024-21131, bsc#1228046: Improve UTF8 String supports
  * JDK-8319859, CVE-2024-21138, bsc#1228047: Better symbol storage
  * JDK-8320097: Improve Image transformations
  * JDK-8320548, CVE-2024-21140, bsc#1228048: Improved loop handling
  * JDK-8322106, CVE-2024-21144, bsc#1228050: Enhance Pack 200 loading
  * JDK-8323231, CVE-2024-21147, bsc#1228052: Improve array management
  * JDK-8323390: Enhance mask blit functionality
  * JDK-8324559, CVE-2024-21145, bsc#1228051: Improve 2D image handling
  * JDK-8325600: Better symbol storage
  * Import of OpenJDK 8 u422 build 05
  * JDK-8025439: [TEST BUG] [macosx] PrintServiceLookup.lookupPrintServices
    doesn't work properly since jdk8b105
  * JDK-8069389: CompilerOracle prefix wildcarding is broken for long strings
  * JDK-8159454: [TEST_BUG] javax/swing/ToolTipManager/7123767/
    /bug7123767.java: number of checked graphics configurations should be
    limited
  * JDK-8198321: javax/swing/JEditorPane/5076514/bug5076514.java fails
  * JDK-8203691: [TESTBUG] Test /runtime/containers/cgroup/PlainRead.java fails
  * JDK-8205407: [windows, vs<2017] C4800 after 8203197
  * JDK-8235834: IBM-943 charset encoder needs updating
  * JDK-8239965: XMLEncoder/Test4625418.java fails due to "Error: Cp943 - can't
    read properly"
  * JDK-8240756: [macos] SwingSet2:TableDemo:Printed Japanese characters were
    garbled
  * JDK-8256152: tests fail because of ambiguous method resolution
  * JDK-8258855: Two tests sun/security/krb5/auto/ /ReplayCacheTestProc.java and
    ReplayCacheTestProcWithMD5.java failed on OL8.3
  * JDK-8262017: C2: assert(n != __null) failed: Bad immediate dominator info.
  * JDK-8268916: Tests for AffirmTrust roots
  * JDK-8278067: Make HttpURLConnection default keep alive timeout configurable
  * JDK-8291226: Create Test Cases to cover scenarios for JDK-8278067
  * JDK-8291637: HttpClient default keep alive timeout not followed if server
    sends invalid value
  * JDK-8291638: Keep-Alive timeout of 0 should close connection immediately
  * JDK-8293562: KeepAliveCache Blocks Threads while Closing Connections
  * JDK-8303466: C2: failed: malformed control flow. Limit type made precise
    with MaxL/MinL
  * JDK-8304074: [JMX] Add an approximation of total bytes allocated on the Java
    heap by the JVM
  * JDK-8313081: MonitoringSupport_lock should be unconditionally initialized
    after 8304074
  * JDK-8315020: The macro definition for LoongArch64 zero build is not
    accurate.
  * JDK-8316138: Add GlobalSign 2 TLS root certificates
  * JDK-8318410: jdk/java/lang/instrument/BootClassPath/ /BootClassPathTest.sh
    fails on Japanese Windows
  * JDK-8320005: Allow loading of shared objects with .a extension on AIX
  * JDK-8324185: [8u] Accept Xcode 12+ builds on macOS
  * JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/
    /AKISerialNumber.java is failing
  * JDK-8325927: [8u] Backport of JDK-8170552 missed part of the test
  * JDK-8326686: Bump update version of OpenJDK: 8u422
  * JDK-8327440: Fix "bad source file" error during beaninfo generation
  * JDK-8328809: [8u] Problem list some CA tests
  * JDK-8328825: Google CAInterop test failures
  * JDK-8329544: [8u] sun/security/krb5/auto/ /ReplayCacheTestProc.java cannot
    find the testlibrary
  * JDK-8331791: [8u] AIX build break from JDK-8320005 backport
  * JDK-8331980: [8u] Problem list CAInterop.java#certignarootca test
  * JDK-8335552: [8u] JDK-8303466 backport to 8u requires 3 ::Identity signature
    fixes
  * Bug fixes
  * JDK-8331730: [8u] GHA: update sysroot for cross builds to Debian bullseye
  * JDK-8333669: [8u] GHA: Dead VS2010 download link
  * JDK-8318039: GHA: Bump macOS and Xcode versions

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise High Performance Computing 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1

  * SUSE Linux Enterprise Server 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1

## Package List:

  * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
    * java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-devel-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-demo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-headless-1.8.0.422-27.105.2
  * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
    * java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-devel-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-demo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-headless-1.8.0.422-27.105.2
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    * java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-devel-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-demo-1.8.0.422-27.105.2
    * java-1_8_0-openjdk-headless-1.8.0.422-27.105.2

## References:

  * https://www.suse.com/security/cve/CVE-2024-21131.html
  * https://www.suse.com/security/cve/CVE-2024-21138.html
  * https://www.suse.com/security/cve/CVE-2024-21140.html
  * https://www.suse.com/security/cve/CVE-2024-21144.html
  * https://www.suse.com/security/cve/CVE-2024-21145.html
  * https://www.suse.com/security/cve/CVE-2024-21147.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1228046
  * https://bugzilla.suse.com/show_bug.cgi?id=1228047
  * https://bugzilla.suse.com/show_bug.cgi?id=1228048
  * https://bugzilla.suse.com/show_bug.cgi?id=1228050
  * https://bugzilla.suse.com/show_bug.cgi?id=1228051
  * https://bugzilla.suse.com/show_bug.cgi?id=1228052

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240820/21be1588/attachment.htm>


More information about the sle-security-updates mailing list