Security update for java-1_8_0-openjdk
Announcement ID: | SUSE-SU-2024:0804-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves six vulnerabilities can now be installed.
Description:
This update for java-1_8_0-openjdk fixes the following issues:
- CVE-2024-20952: Fixed RSA padding issue and timing side-channel attack against TLS (8317547) (bsc#1218911).
- CVE-2024-20921: Fixed range check loop optimization issue (8314307) (bsc#1218905).
- CVE-2024-20926: Fixed rbitrary Java code execution in Nashorn (8314284) (bsc#1218906).
- CVE-2024-20919: Fixed JVM class file verifier flaw allows unverified byte code execution (8314295) (bsc#1218903).
- CVE-2024-20918: Fixed array out-of-bounds access due to missing range check in C1 compiler (8314468) (bsc#1218907).
- CVE-2024-20945: Fixed logging of digital signature private keys (8316976) (bsc#1218909).
Update to version jdk8u402 (icedtea-3.30.0).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-804=1
-
SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-804=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-804=1
Package List:
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
- java-1_8_0-openjdk-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-debugsource-1.8.0.402-27.96.1
- java-1_8_0-openjdk-headless-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-devel-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-devel-1.8.0.402-27.96.1
- java-1_8_0-openjdk-demo-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-1.8.0.402-27.96.1
- java-1_8_0-openjdk-headless-1.8.0.402-27.96.1
- java-1_8_0-openjdk-demo-1.8.0.402-27.96.1
-
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
- java-1_8_0-openjdk-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-debugsource-1.8.0.402-27.96.1
- java-1_8_0-openjdk-headless-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-devel-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-devel-1.8.0.402-27.96.1
- java-1_8_0-openjdk-demo-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-1.8.0.402-27.96.1
- java-1_8_0-openjdk-headless-1.8.0.402-27.96.1
- java-1_8_0-openjdk-demo-1.8.0.402-27.96.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
- java-1_8_0-openjdk-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-debugsource-1.8.0.402-27.96.1
- java-1_8_0-openjdk-headless-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-devel-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-devel-1.8.0.402-27.96.1
- java-1_8_0-openjdk-demo-debuginfo-1.8.0.402-27.96.1
- java-1_8_0-openjdk-1.8.0.402-27.96.1
- java-1_8_0-openjdk-headless-1.8.0.402-27.96.1
- java-1_8_0-openjdk-demo-1.8.0.402-27.96.1
References:
- https://www.suse.com/security/cve/CVE-2024-20918.html
- https://www.suse.com/security/cve/CVE-2024-20919.html
- https://www.suse.com/security/cve/CVE-2024-20921.html
- https://www.suse.com/security/cve/CVE-2024-20926.html
- https://www.suse.com/security/cve/CVE-2024-20945.html
- https://www.suse.com/security/cve/CVE-2024-20952.html
- https://bugzilla.suse.com/show_bug.cgi?id=1218903
- https://bugzilla.suse.com/show_bug.cgi?id=1218905
- https://bugzilla.suse.com/show_bug.cgi?id=1218906
- https://bugzilla.suse.com/show_bug.cgi?id=1218907
- https://bugzilla.suse.com/show_bug.cgi?id=1218909
- https://bugzilla.suse.com/show_bug.cgi?id=1218911