<div class="container">
    <h1>Security update for java-1_8_0-openjdk</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:1450-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>low</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213470">bsc#1213470</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222979">bsc#1222979</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222983">bsc#1222983</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222984">bsc#1222984</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222986">bsc#1222986</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21011.html">CVE-2024-21011</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21068.html">CVE-2024-21068</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21085.html">CVE-2024-21085</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21094.html">CVE-2024-21094</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21011</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21068</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21085</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21094</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves four vulnerabilities and has one security fix can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for java-1_8_0-openjdk fixes the following issues:</p>
<ul>
<li>CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979)</li>
<li>CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983)  </li>
<li>CVE-2024-21085: Fixed Pack200 excessive memory allocation (JDK-8322114,bsc#1222984)</li>
<li>CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with "Exceeded _node_regs array" (JDK-8317507,JDK-8325348,bsc#1222986)</li>
</ul>
<p>Other fixes:
- Update to version jdk8u412 (icedtea-3.31.0) (April 2024 CPU)
  * Security fixes
    + JDK-8318340: Improve RSA key implementations
  * Import of OpenJDK 8 u412 build 08
    + JDK-8011180: Delete obsolete scripts
    + JDK-8016451: Scary messages emitted by
      build.tools.generatenimbus.PainterGenerator during build
    + JDK-8021961: setAlwaysOnTop doesn&#x27;t behave correctly in
      Linux/Solaris under certain scenarios
    + JDK-8023735: [TESTBUG][macosx]
      runtime/XCheckJniJsig/XCheckJSig.java fails on MacOS X
    + JDK-8074860: Structured Exception Catcher missing around
      CreateJavaVM on Windows
    + JDK-8079441: Intermittent failures on Windows with "Unexpected
      exit from test [exit code: 1080890248]" (0x406d1388)
    + JDK-8155590: Dubious collection management in
      sun.net.www.http.KeepAliveCache
    + JDK-8168518: rcache interop with krb5-1.15
    + JDK-8183503: Update hotspot tests to allow for unique test
      classes directory
    + JDK-8186095: upgrade to jtreg 4.2 b08
    + JDK-8186199: [windows] JNI_DestroyJavaVM not covered by SEH
    + JDK-8192931: Regression test
      java/awt/font/TextLayout/CombiningPerf.java fails
    + JDK-8208655: use JTreg skipped status in hotspot tests
    + JDK-8208701: Fix for JDK-8208655 causes test failures in CI
      tier1
    + JDK-8208706: compiler/tiered/
      /ConstantGettersTransitionsTest.java fails to compile
    + JDK-8213410: UseCompressedOops requirement check fails fails
      on 32-bit system
    + JDK-8222323: ChildAlwaysOnTopTest.java fails with
      "RuntimeException: Failed to unset alwaysOnTop"
    + JDK-8224768: Test ActalisCA.java fails
    + JDK-8251155: HostIdentifier fails to canonicalize hostnames
      starting with digits
    + JDK-8251551: Use .md filename extension for README
    + JDK-8268678: LetsEncryptCA.java test fails as Let’s Encrypt
      Authority X3 is retired
    + JDK-8270280: security/infra/java/security/cert/
      /CertPathValidator/certification/LetsEncryptCA.java OCSP
      response error
    + JDK-8270517: Add Zero support for LoongArch
    + JDK-8272708: [Test]: Cleanup: test/jdk/security/infra/java/
      /security/cert/CertPathValidator/certification/BuypassCA.java
      no longer needs ocspEnabled
    + JDK-8276139: TestJpsHostName.java not reliable, better to
      expand HostIdentifierCreate.java test
    + JDK-8288132: Update test artifacts in QuoVadis CA interop
      tests
    + JDK-8297955: LDAP CertStore should use LdapName and not
      String for DNs
    + JDK-8301310: The SendRawSysexMessage test may cause a JVM
      crash
    + JDK-8308592: Framework for CA interoperability testing
    + JDK-8312126: NullPointerException in CertStore.getCRLs after
      8297955
    + JDK-8315042: NPE in PKCS7.parseOldSignedData
    + JDK-8315757: [8u] Add cacerts JTREG tests to GHA tier1 test
      set
    + JDK-8320713: Bump update version of OpenJDK: 8u412
    + JDK-8321060: [8u] hotspot needs to recognise VS2022
    + JDK-8321408: Add Certainly roots R1 and E1
    + JDK-8322725: (tz) Update Timezone Data to 2023d
    + JDK-8322750: Test "api/java_awt/interactive/
      /SystemTrayTests.html" failed because A blue ball icon is
      added outside of the system tray
    + JDK-8323202: [8u] Remove get_source.sh and hgforest.sh
    + JDK-8323640: [TESTBUG]testMemoryFailCount in jdk/internal/
      /platform/docker/TestDockerMemoryMetrics.java always fail
      because OOM killed
    + JDK-8324530: Build error with gcc 10
    + JDK-8325150: (tz) Update Timezone Data to 2024a
  * Bug fixes
    + Support make 4.4</p>
<ul>
<li>
<p>Do not recommend timezone-java8 (bsc#1213470)</p>
</li>
<li>
<p>Use %patch -P N instead of deprecated %patchN.</p>
</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1450=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1450=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1450=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
                    <ul>
                        
                            <li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-devel-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-debugsource-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-demo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-headless-1.8.0.412-27.99.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-devel-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-debugsource-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-demo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-headless-1.8.0.412-27.99.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
                    <ul>
                        
                            <li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-devel-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-debugsource-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-demo-1.8.0.412-27.99.1</li>
                        
                            <li>java-1_8_0-openjdk-headless-1.8.0.412-27.99.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21011.html">https://www.suse.com/security/cve/CVE-2024-21011.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21068.html">https://www.suse.com/security/cve/CVE-2024-21068.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21085.html">https://www.suse.com/security/cve/CVE-2024-21085.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21094.html">https://www.suse.com/security/cve/CVE-2024-21094.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213470">https://bugzilla.suse.com/show_bug.cgi?id=1213470</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222979">https://bugzilla.suse.com/show_bug.cgi?id=1222979</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222983">https://bugzilla.suse.com/show_bug.cgi?id=1222983</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222984">https://bugzilla.suse.com/show_bug.cgi?id=1222984</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222986">https://bugzilla.suse.com/show_bug.cgi?id=1222986</a>
                    </li>
                
            
        </ul>
    
</div>