SUSE: 2024:2766-1 important: java-1_8_0-openjdk Security Advisory Updates
Summary
## This update for java-1_8_0-openjdk fixes the following issues: Update to version jdk8u422 (icedtea-3.32.0) * Security fixes * JDK-8314794, CVE-2024-21131, bsc#1228046: Improve UTF8 String supports * JDK-8319859, CVE-2024-21138, bsc#1228047: Better symbol storage * JDK-8320097: Improve Image transformations * JDK-8320548, CVE-2024-21140, bsc#1228048: Improved loop handling * JDK-8322106, CVE-2024-21144, bsc#1228050: Enhance Pack 200 loading * JDK-8323231, CVE-2024-21147, bsc#1228052: Improve array management * JDK-8323390: Enhance mask blit functionality * JDK-8324559, CVE-2024-21145, bsc#1228051: Improve 2D image handling * JDK-8325600: Better symbol storage * Import of OpenJDK 8 u422 build 05 * JDK-8025439: [TEST BUG] [macosx] PrintServiceLookup.lookupPrintServices doesn't work properly since jdk8b105 * JDK-8069389: CompilerOracle prefix wildcarding is broken for long strings * JDK-8159454: [TEST_BUG] javax/swing/ToolTipManager/7123767/ /bug7123767.java: number of checked graphics configurations should be limited * JDK-8198321: javax/swing/JEditorPane/5076514/bug5076514.java fails * JDK-8203691: [TESTBUG] Test /runtime/containers/cgroup/PlainRead.java fails * JDK-8205407: [windows, vs<2017] C4800 after 8203197 * JDK-8235834: IBM-943 charset encoder needs updating * JDK-8239965: XMLEncoder/Test4625418.java fails due to "Error: Cp943 - can't read properly" * JDK-8240756: [macos] SwingSet2:TableDemo:Printed Japanese characters were garbled * JDK-8256152: tests fail because of ambiguous method resolution * JDK-8258855: Two tests sun/security/krb5/auto/ /ReplayCacheTestProc.java and ReplayCacheTestProcWithMD5.java failed on OL8.3 * JDK-8262017: C2: assert(n != __null) failed: Bad immediate dominator info. * JDK-8268916: Tests for AffirmTrust roots * JDK-8278067: Make HttpURLConnection default keep alive timeout configurable * JDK-8291226: Create Test Cases to cover scenarios for JDK-8278067 * JDK-8291637: HttpClient default keep alive timeout not followed if server sends invalid value * JDK-8291638: Keep-Alive timeout of 0 should close connection immediately * JDK-8293562: KeepAliveCache Blocks Threads while Closing Connections * JDK-8303466: C2: failed: malformed control flow. Limit type made precise with MaxL/MinL * JDK-8304074: [JMX] Add an approximation of total bytes allocated on the Java heap by the JVM * JDK-8313081: MonitoringSupport_lock should be unconditionally initialized after 8304074 * JDK-8315020: The macro definition for LoongArch64 zero build is not accurate. * JDK-8316138: Add GlobalSign 2 TLS root certificates * JDK-8318410: jdk/java/lang/instrument/BootClassPath/ /BootClassPathTest.sh fails on Japanese Windows * JDK-8320005: Allow loading of shared objects with .a extension on AIX * JDK-8324185: [8u] Accept Xcode 12+ builds on macOS * JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/ /AKISerialNumber.java is failing * JDK-8325927: [8u] Backport of JDK-8170552 missed part of the test * JDK-8326686: Bump update version of OpenJDK: 8u422 * JDK-8327440: Fix "bad source file" error during beaninfo generation * JDK-8328809: [8u] Problem list some CA tests * JDK-8328825: Google CAInterop test failures * JDK-8329544: [8u] sun/security/krb5/auto/ /ReplayCacheTestProc.java cannot find the testlibrary * JDK-8331791: [8u] AIX build break from JDK-8320005 backport * JDK-8331980: [8u] Problem list CAInterop.java#certignarootca test * JDK-8335552: [8u] JDK-8303466 backport to 8u requires 3 ::Identity signature fixes * Bug fixes * JDK-8331730: [8u] GHA: update sysroot for cross builds to Debian bullseye * JDK-8333669: [8u] GHA: Dead VS2010 download link * JDK-8318039: GHA: Bump macOS and Xcode versions ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2766=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2 * java-1_8_0-openjdk-1.8.0.422-27.105.2 * java-1_8_0-openjdk-devel-1.8.0.422-27.105.2 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-demo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-headless-1.8.0.422-27.105.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2 * java-1_8_0-openjdk-1.8.0.422-27.105.2 * java-1_8_0-openjdk-devel-1.8.0.422-27.105.2 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-demo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-headless-1.8.0.422-27.105.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-debugsource-1.8.0.422-27.105.2 * java-1_8_0-openjdk-1.8.0.422-27.105.2 * java-1_8_0-openjdk-devel-1.8.0.422-27.105.2 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-demo-1.8.0.422-27.105.2 * java-1_8_0-openjdk-headless-1.8.0.422-27.105.2
References
* bsc#1228046
* bsc#1228047
* bsc#1228048
* bsc#1228050
* bsc#1228051
* bsc#1228052
Cross-
* CVE-2024-21131
* CVE-2024-21138
* CVE-2024-21140
* CVE-2024-21144
* CVE-2024-21145
* CVE-2024-21147
CVSS scores:
* CVE-2024-21131 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21138 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21140 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21144 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21147 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves six vulnerabilities can now be installed.
##
* https://www.suse.com/security/cve/CVE-2024-21131.html
* https://www.suse.com/security/cve/CVE-2024-21138.html
* https://www.suse.com/security/cve/CVE-2024-21140.html
* https://www.suse.com/security/cve/CVE-2024-21144.html
* https://www.suse.com/security/cve/CVE-2024-21145.html
* https://www.suse.com/security/cve/CVE-2024-21147.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228046
* https://bugzilla.suse.com/show_bug.cgi?id=1228047
* https://bugzilla.suse.com/show_bug.cgi?id=1228048
* https://bugzilla.suse.com/show_bug.cgi?id=1228050
* https://bugzilla.suse.com/show_bug.cgi?id=1228051
* https://bugzilla.suse.com/show_bug.cgi?id=1228052