<div class="container">
<h1>Security update for java-1_8_0-openjdk</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:2766-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228046">bsc#1228046</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228047">bsc#1228047</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228048">bsc#1228048</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228050">bsc#1228050</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228051">bsc#1228051</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228052">bsc#1228052</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-21131.html">CVE-2024-21131</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-21138.html">CVE-2024-21138</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-21140.html">CVE-2024-21140</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-21144.html">CVE-2024-21144</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-21145.html">CVE-2024-21145</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-21147.html">CVE-2024-21147</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-21131</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-21138</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-21140</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-21144</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.7</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-21145</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-21147</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.4</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves six vulnerabilities can now be installed.</p>
<h2>Description:</h2>
<p>This update for java-1_8_0-openjdk fixes the following issues:</p>
<p>Update to version jdk8u422 (icedtea-3.32.0)</p>
<ul>
<li>Security fixes</li>
<li>JDK-8314794, CVE-2024-21131, bsc#1228046: Improve UTF8 String supports</li>
<li>JDK-8319859, CVE-2024-21138, bsc#1228047: Better symbol storage</li>
<li>JDK-8320097: Improve Image transformations</li>
<li>JDK-8320548, CVE-2024-21140, bsc#1228048: Improved loop handling</li>
<li>JDK-8322106, CVE-2024-21144, bsc#1228050: Enhance Pack 200 loading</li>
<li>JDK-8323231, CVE-2024-21147, bsc#1228052: Improve array management</li>
<li>JDK-8323390: Enhance mask blit functionality</li>
<li>JDK-8324559, CVE-2024-21145, bsc#1228051: Improve 2D image handling</li>
<li>JDK-8325600: Better symbol storage</li>
<li>Import of OpenJDK 8 u422 build 05</li>
<li>JDK-8025439: [TEST BUG] [macosx]
PrintServiceLookup.lookupPrintServices doesn't work properly
since jdk8b105</li>
<li>JDK-8069389: CompilerOracle prefix wildcarding is broken for
long strings</li>
<li>JDK-8159454: [TEST_BUG] javax/swing/ToolTipManager/7123767/
/bug7123767.java: number of checked graphics configurations
should be limited</li>
<li>JDK-8198321: javax/swing/JEditorPane/5076514/bug5076514.java fails</li>
<li>JDK-8203691: [TESTBUG] Test
/runtime/containers/cgroup/PlainRead.java fails</li>
<li>JDK-8205407: [windows, vs<2017] C4800 after 8203197</li>
<li>JDK-8235834: IBM-943 charset encoder needs updating</li>
<li>JDK-8239965: XMLEncoder/Test4625418.java fails due to "Error:
Cp943 - can't read properly"</li>
<li>JDK-8240756: [macos] SwingSet2:TableDemo:Printed Japanese
characters were garbled</li>
<li>JDK-8256152: tests fail because of ambiguous method resolution</li>
<li>JDK-8258855: Two tests sun/security/krb5/auto/
/ReplayCacheTestProc.java and ReplayCacheTestProcWithMD5.java
failed on OL8.3</li>
<li>JDK-8262017: C2: assert(n != __null) failed: Bad immediate
dominator info.</li>
<li>JDK-8268916: Tests for AffirmTrust roots</li>
<li>JDK-8278067: Make HttpURLConnection default keep alive
timeout configurable</li>
<li>JDK-8291226: Create Test Cases to cover scenarios for
JDK-8278067</li>
<li>JDK-8291637: HttpClient default keep alive timeout not
followed if server sends invalid value</li>
<li>JDK-8291638: Keep-Alive timeout of 0 should close connection
immediately</li>
<li>JDK-8293562: KeepAliveCache Blocks Threads while Closing
Connections</li>
<li>JDK-8303466: C2: failed: malformed control flow. Limit type
made precise with MaxL/MinL</li>
<li>JDK-8304074: [JMX] Add an approximation of total bytes
allocated on the Java heap by the JVM</li>
<li>JDK-8313081: MonitoringSupport_lock should be unconditionally
initialized after 8304074</li>
<li>JDK-8315020: The macro definition for LoongArch64 zero build
is not accurate.</li>
<li>JDK-8316138: Add GlobalSign 2 TLS root certificates</li>
<li>JDK-8318410: jdk/java/lang/instrument/BootClassPath/
/BootClassPathTest.sh fails on Japanese Windows</li>
<li>JDK-8320005: Allow loading of shared objects with .a
extension on AIX</li>
<li>JDK-8324185: [8u] Accept Xcode 12+ builds on macOS</li>
<li>JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/
/AKISerialNumber.java is failing</li>
<li>JDK-8325927: [8u] Backport of JDK-8170552 missed part of the test</li>
<li>JDK-8326686: Bump update version of OpenJDK: 8u422</li>
<li>JDK-8327440: Fix "bad source file" error during beaninfo
generation</li>
<li>JDK-8328809: [8u] Problem list some CA tests</li>
<li>JDK-8328825: Google CAInterop test failures</li>
<li>JDK-8329544: [8u] sun/security/krb5/auto/
/ReplayCacheTestProc.java cannot find the testlibrary</li>
<li>JDK-8331791: [8u] AIX build break from JDK-8320005 backport</li>
<li>JDK-8331980: [8u] Problem list CAInterop.java#certignarootca test</li>
<li>JDK-8335552: [8u] JDK-8303466 backport to 8u requires 3
::Identity signature fixes</li>
<li>Bug fixes</li>
<li>JDK-8331730: [8u] GHA: update sysroot for cross builds to
Debian bullseye</li>
<li>JDK-8333669: [8u] GHA: Dead VS2010 download link</li>
<li>JDK-8318039: GHA: Bump macOS and Xcode versions</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 12 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 12 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 12 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
<ul>
<li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-devel-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-demo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-headless-1.8.0.422-27.105.2</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
<ul>
<li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-devel-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-demo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-headless-1.8.0.422-27.105.2</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
<ul>
<li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-devel-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-demo-1.8.0.422-27.105.2</li>
<li>java-1_8_0-openjdk-headless-1.8.0.422-27.105.2</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-21131.html">https://www.suse.com/security/cve/CVE-2024-21131.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-21138.html">https://www.suse.com/security/cve/CVE-2024-21138.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-21140.html">https://www.suse.com/security/cve/CVE-2024-21140.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-21144.html">https://www.suse.com/security/cve/CVE-2024-21144.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-21145.html">https://www.suse.com/security/cve/CVE-2024-21145.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-21147.html">https://www.suse.com/security/cve/CVE-2024-21147.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228046">https://bugzilla.suse.com/show_bug.cgi?id=1228046</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228047">https://bugzilla.suse.com/show_bug.cgi?id=1228047</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228048">https://bugzilla.suse.com/show_bug.cgi?id=1228048</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228050">https://bugzilla.suse.com/show_bug.cgi?id=1228050</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228051">https://bugzilla.suse.com/show_bug.cgi?id=1228051</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1228052">https://bugzilla.suse.com/show_bug.cgi?id=1228052</a>
</li>
</ul>
</div>