timezone-java 2023c contains corrupt data for some timezones
VUL-0: CVE-2024-23672: tomcat,tomcat10: WebSocket DoS with incomplete closing handshake
VUL-0: CVE-2024-24549: tomcat,tomcat10: HTTP/2 header handling DoS
VUL-0: CVE-2024-21011: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: long Exception message leading to crash (8319851)
VUL-0: CVE-2024-21068: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: integer overflow in C1 compiler address generation (8322122)
VUL-0: CVE-2024-21085: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: Pack200 excessive memory allocation (8322114)
VUL-0: CVE-2024-21094: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)
VUL-0: CVE-2024-21012: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)
VUL-0: CVE-2024-30171: bouncycastle: timing side-channel attacks against RSA decryption (both PKCS#1v1.5 and OAEP)
[SUSE:SLFO:Main] python-h5py and python-h5py:openmpi4 fails to build on ppc64le
tomcat throws java.lang.UnsatisfiedLinkError when running customer's application
java-*-openjdk-headless is missing prerequires on file
VUL-0: CVE-2024-34750: tomcat,tomcat10,tomcat6: Improper Handling of Exceptional Conditions
VUL-0: CVE-2024-21131: java-*-openjdk,java-*-ibm: OpenJDK: potential UTF8 size overflow
VUL-0: CVE-2024-21138: java-*-openjdk,java-*-ibm: OpenJDK: Excessive symbol length can lead to infinite loop
VUL-0: CVE-2024-21140: java-*-openjdk,java-*-ibm: OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow
VUL-0: CVE-2024-21144: java-*-openjdk,java-*-ibm: OpenJDK: Pack200 increase loading time due to improper header validation
VUL-0: CVE-2024-21145: java-*-openjdk,java-*-ibm: OpenJDK: Out-of-bounds access in 2D image handling
VUL-0: CVE-2024-21147: java-*-openjdk,java-*-ibm: OpenJDK: RangeCheckElimination array index overflow
VUL-0: CVE-2024-0760: bind: A flood of DNS messages over TCP may make the server unstable
VUL-0: CVE-2024-1737: bind: BIND's database will be slow if a very large number of RRs exist at the same name
VUL-0: CVE-2024-1975: bind: SIG(0) can be used to exhaust CPU resources
VUL-0: CVE-2024-4076: bind: Assertion failure when serving both stale cache data and authoritative zone content
jcronenberg
important
security
Security update for python-h5py, python-pytest-mpi, bouncycastle, tomcat10, java-11-openjdk, tomcat, java-17-openjdk, java-1_8_0-openjdk, bind, java-21-openjdk
This update for python-h5py, python-pytest-mpi, bouncycastle, tomcat10, java-11-openjdk, tomcat, java-17-openjdk, java-1_8_0-openjdk, bind, java-21-openjdk fixes the following issues:
bind:
- Update to version 9.20.0
bouncycastle:
- Update to version 1.78.1
java-11-openjdk:
- Upgrade to upstream tag jdk-11.0.24+8 (July 2024 CPU)
java-17-openjdk:
- Update to upstream tag jdk-17.0.12+7 (July 2024 CPU)
java-1_8_0-openjdk:
- Update to version jdk8u422 (icedtea-3.32.0)
java-21-openjdk:
- Update to upstream tag jdk-21.0.4+7 (July 2024 CPU)
python-h5py:
- Disable test for ppc64le because of Insufficient precision
bsc#1225381
python-pytest-mpi:
- Skip some tests that produces a Segmentation fault in s390x
tomcat:
- Update to Tomcat 9.0.91
tomcat10:
- Update to Tomcat 10.1.25
bind
bouncycastle
java-11-openjdk
java-17-openjdk
java-1_8_0-openjdk
java-21-openjdk
python-h5py
python-h5py:openmpi4
python-pytest-mpi
tomcat
tomcat10