<div class="container">
    <h1>Security update for java-1_8_0-openjdk</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2024:2766-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228046">bsc#1228046</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228047">bsc#1228047</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228048">bsc#1228048</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228050">bsc#1228050</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228051">bsc#1228051</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228052">bsc#1228052</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21131.html">CVE-2024-21131</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21138.html">CVE-2024-21138</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21140.html">CVE-2024-21140</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21144.html">CVE-2024-21144</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21145.html">CVE-2024-21145</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-21147.html">CVE-2024-21147</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21131</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21138</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21140</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21144</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21145</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-21147</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves six vulnerabilities can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for java-1_8_0-openjdk fixes the following issues:</p>
<p>Update to version jdk8u422 (icedtea-3.32.0)</p>
<ul>
<li>Security fixes</li>
<li>JDK-8314794, CVE-2024-21131, bsc#1228046: Improve UTF8 String supports</li>
<li>JDK-8319859, CVE-2024-21138, bsc#1228047: Better symbol storage</li>
<li>JDK-8320097: Improve Image transformations</li>
<li>JDK-8320548, CVE-2024-21140, bsc#1228048: Improved loop handling</li>
<li>JDK-8322106, CVE-2024-21144, bsc#1228050: Enhance Pack 200 loading</li>
<li>JDK-8323231, CVE-2024-21147, bsc#1228052: Improve array management</li>
<li>JDK-8323390: Enhance mask blit functionality</li>
<li>JDK-8324559, CVE-2024-21145, bsc#1228051: Improve 2D image handling</li>
<li>JDK-8325600: Better symbol storage</li>
<li>Import of OpenJDK 8 u422 build 05</li>
<li>JDK-8025439: [TEST BUG] [macosx]
    PrintServiceLookup.lookupPrintServices doesn&#x27;t work properly
    since jdk8b105</li>
<li>JDK-8069389: CompilerOracle prefix wildcarding is broken for
    long strings</li>
<li>JDK-8159454: [TEST_BUG] javax/swing/ToolTipManager/7123767/
    /bug7123767.java: number of checked graphics configurations
    should be limited</li>
<li>JDK-8198321: javax/swing/JEditorPane/5076514/bug5076514.java fails</li>
<li>JDK-8203691: [TESTBUG] Test
    /runtime/containers/cgroup/PlainRead.java fails</li>
<li>JDK-8205407: [windows, vs<2017] C4800 after 8203197</li>
<li>JDK-8235834: IBM-943 charset encoder needs updating</li>
<li>JDK-8239965: XMLEncoder/Test4625418.java fails due to "Error:
    Cp943 - can&#x27;t read properly"</li>
<li>JDK-8240756: [macos] SwingSet2:TableDemo:Printed Japanese
    characters were garbled</li>
<li>JDK-8256152: tests fail because of ambiguous method resolution</li>
<li>JDK-8258855: Two tests sun/security/krb5/auto/
    /ReplayCacheTestProc.java and ReplayCacheTestProcWithMD5.java
    failed on OL8.3</li>
<li>JDK-8262017: C2: assert(n != __null) failed: Bad immediate
    dominator info.</li>
<li>JDK-8268916: Tests for AffirmTrust roots</li>
<li>JDK-8278067: Make HttpURLConnection default keep alive
    timeout configurable</li>
<li>JDK-8291226: Create Test Cases to cover scenarios for
    JDK-8278067</li>
<li>JDK-8291637: HttpClient default keep alive timeout not
    followed if server sends invalid value</li>
<li>JDK-8291638: Keep-Alive timeout of 0 should close connection
    immediately</li>
<li>JDK-8293562: KeepAliveCache Blocks Threads while Closing
    Connections</li>
<li>JDK-8303466: C2: failed: malformed control flow. Limit type
    made precise with MaxL/MinL</li>
<li>JDK-8304074: [JMX] Add an approximation of total bytes
    allocated on the Java heap by the JVM</li>
<li>JDK-8313081: MonitoringSupport_lock should be unconditionally
    initialized after 8304074</li>
<li>JDK-8315020: The macro definition for LoongArch64 zero build
    is not accurate.</li>
<li>JDK-8316138: Add GlobalSign 2 TLS root certificates</li>
<li>JDK-8318410: jdk/java/lang/instrument/BootClassPath/
    /BootClassPathTest.sh fails on Japanese Windows</li>
<li>JDK-8320005: Allow loading of shared objects with .a
    extension on AIX</li>
<li>JDK-8324185: [8u] Accept Xcode 12+ builds on macOS</li>
<li>JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/
    /AKISerialNumber.java is failing</li>
<li>JDK-8325927: [8u] Backport of JDK-8170552 missed part of the test</li>
<li>JDK-8326686: Bump update version of OpenJDK: 8u422</li>
<li>JDK-8327440: Fix "bad source file" error during beaninfo
    generation</li>
<li>JDK-8328809: [8u] Problem list some CA tests</li>
<li>JDK-8328825: Google CAInterop test failures</li>
<li>JDK-8329544: [8u] sun/security/krb5/auto/
    /ReplayCacheTestProc.java cannot find the testlibrary</li>
<li>JDK-8331791: [8u] AIX build break from JDK-8320005 backport</li>
<li>JDK-8331980: [8u] Problem list CAInterop.java#certignarootca test</li>
<li>JDK-8335552: [8u] JDK-8303466 backport to 8u requires 3
    ::Identity signature fixes</li>
<li>Bug fixes</li>
<li>JDK-8331730: [8u] GHA: update sysroot for cross builds to
    Debian bullseye</li>
<li>JDK-8333669: [8u] GHA: Dead VS2010 download link</li>
<li>JDK-8318039: GHA: Bump macOS and Xcode versions</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Performance Computing 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Server for SAP Applications 12 SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
                    <ul>
                        
                            <li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-devel-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-demo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-headless-1.8.0.422-27.105.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-devel-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-demo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-headless-1.8.0.422-27.105.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
                    <ul>
                        
                            <li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-devel-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-demo-1.8.0.422-27.105.2</li>
                        
                            <li>java-1_8_0-openjdk-headless-1.8.0.422-27.105.2</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21131.html">https://www.suse.com/security/cve/CVE-2024-21131.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21138.html">https://www.suse.com/security/cve/CVE-2024-21138.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21140.html">https://www.suse.com/security/cve/CVE-2024-21140.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21144.html">https://www.suse.com/security/cve/CVE-2024-21144.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21145.html">https://www.suse.com/security/cve/CVE-2024-21145.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-21147.html">https://www.suse.com/security/cve/CVE-2024-21147.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228046">https://bugzilla.suse.com/show_bug.cgi?id=1228046</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228047">https://bugzilla.suse.com/show_bug.cgi?id=1228047</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228048">https://bugzilla.suse.com/show_bug.cgi?id=1228048</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228050">https://bugzilla.suse.com/show_bug.cgi?id=1228050</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228051">https://bugzilla.suse.com/show_bug.cgi?id=1228051</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1228052">https://bugzilla.suse.com/show_bug.cgi?id=1228052</a>
                    </li>
                
            
        </ul>
    
</div>