SUSE_ALP_Standard/patchinfo.20240916140553863933.269002615871826/_patchinfo

98 lines
6.3 KiB
Plaintext

<patchinfo>
<!-- generated from request(s) 340962, 332638, 339409, 339410, 340075, 339411, 332487, 332480, 338560, 338561 -->
<issue tracker="bnc" id="1213470">timezone-java 2023c contains corrupt data for some timezones</issue>
<issue tracker="bnc" id="1221385">VUL-0: CVE-2024-23672: tomcat,tomcat10: WebSocket DoS with incomplete closing handshake</issue>
<issue tracker="bnc" id="1221386">VUL-0: CVE-2024-24549: tomcat,tomcat10: HTTP/2 header handling DoS</issue>
<issue tracker="bnc" id="1222979">VUL-0: CVE-2024-21011: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: long Exception message leading to crash (8319851)</issue>
<issue tracker="bnc" id="1222983">VUL-0: CVE-2024-21068: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: integer overflow in C1 compiler address generation (8322122)</issue>
<issue tracker="bnc" id="1222984">VUL-0: CVE-2024-21085: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: Pack200 excessive memory allocation (8322114)</issue>
<issue tracker="bnc" id="1222986">VUL-0: CVE-2024-21094: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507)</issue>
<issue tracker="bnc" id="1222987">VUL-0: CVE-2024-21012: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)</issue>
<issue tracker="bnc" id="1223252">VUL-0: CVE-2024-30171: bouncycastle: timing side-channel attacks against RSA decryption (both PKCS#1v1.5 and OAEP)</issue>
<issue tracker="bnc" id="1225381">[SUSE:SLFO:Main] python-h5py and python-h5py:openmpi4 fails to build on ppc64le</issue>
<issue tracker="bnc" id="1226274">tomcat throws java.lang.UnsatisfiedLinkError when running customer's application</issue>
<issue tracker="bnc" id="1227298">java-*-openjdk-headless is missing prerequires on file</issue>
<issue tracker="bnc" id="1227399">VUL-0: CVE-2024-34750: tomcat,tomcat10,tomcat6: Improper Handling of Exceptional Conditions</issue>
<issue tracker="bnc" id="1228046">VUL-0: CVE-2024-21131: java-*-openjdk,java-*-ibm: OpenJDK: potential UTF8 size overflow</issue>
<issue tracker="bnc" id="1228047">VUL-0: CVE-2024-21138: java-*-openjdk,java-*-ibm: OpenJDK: Excessive symbol length can lead to infinite loop</issue>
<issue tracker="bnc" id="1228048">VUL-0: CVE-2024-21140: java-*-openjdk,java-*-ibm: OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow</issue>
<issue tracker="bnc" id="1228050">VUL-0: CVE-2024-21144: java-*-openjdk,java-*-ibm: OpenJDK: Pack200 increase loading time due to improper header validation</issue>
<issue tracker="bnc" id="1228051">VUL-0: CVE-2024-21145: java-*-openjdk,java-*-ibm: OpenJDK: Out-of-bounds access in 2D image handling</issue>
<issue tracker="bnc" id="1228052">VUL-0: CVE-2024-21147: java-*-openjdk,java-*-ibm: OpenJDK: RangeCheckElimination array index overflow</issue>
<issue tracker="bnc" id="1228255">VUL-0: CVE-2024-0760: bind: A flood of DNS messages over TCP may make the server unstable</issue>
<issue tracker="bnc" id="1228256">VUL-0: CVE-2024-1737: bind: BIND's database will be slow if a very large number of RRs exist at the same name</issue>
<issue tracker="bnc" id="1228257">VUL-0: CVE-2024-1975: bind: SIG(0) can be used to exhaust CPU resources</issue>
<issue tracker="bnc" id="1228258">VUL-0: CVE-2024-4076: bind: Assertion failure when serving both stale cache data and authoritative zone content</issue>
<issue tracker="cve" id="2024-301"/>
<issue tracker="cve" id="2024-0760"/>
<issue tracker="cve" id="2024-1737"/>
<issue tracker="cve" id="2024-1975"/>
<issue tracker="cve" id="2024-4076"/>
<issue tracker="cve" id="2024-21011"/>
<issue tracker="cve" id="2024-21012"/>
<issue tracker="cve" id="2024-21068"/>
<issue tracker="cve" id="2024-21085"/>
<issue tracker="cve" id="2024-21094"/>
<issue tracker="cve" id="2024-21131"/>
<issue tracker="cve" id="2024-21138"/>
<issue tracker="cve" id="2024-21140"/>
<issue tracker="cve" id="2024-21144"/>
<issue tracker="cve" id="2024-21145"/>
<issue tracker="cve" id="2024-21147"/>
<issue tracker="cve" id="2024-23672"/>
<issue tracker="cve" id="2024-24549"/>
<issue tracker="cve" id="2024-29857"/>
<issue tracker="cve" id="2024-30171"/>
<issue tracker="cve" id="2024-30172"/>
<issue tracker="cve" id="2024-34750"/>
<packager>jcronenberg</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for python-h5py, python-pytest-mpi, bouncycastle, tomcat10, java-11-openjdk, tomcat, java-17-openjdk, java-1_8_0-openjdk, bind, java-21-openjdk</summary>
<description>This update for python-h5py, python-pytest-mpi, bouncycastle, tomcat10, java-11-openjdk, tomcat, java-17-openjdk, java-1_8_0-openjdk, bind, java-21-openjdk fixes the following issues:
bind:
- Update to version 9.20.0
bouncycastle:
- Update to version 1.78.1
java-11-openjdk:
- Upgrade to upstream tag jdk-11.0.24+8 (July 2024 CPU)
java-17-openjdk:
- Update to upstream tag jdk-17.0.12+7 (July 2024 CPU)
java-1_8_0-openjdk:
- Update to version jdk8u422 (icedtea-3.32.0)
java-21-openjdk:
- Update to upstream tag jdk-21.0.4+7 (July 2024 CPU)
python-h5py:
- Disable test for ppc64le because of Insufficient precision
bsc#1225381
python-pytest-mpi:
- Skip some tests that produces a Segmentation fault in s390x
tomcat:
- Update to Tomcat 9.0.91
tomcat10:
- Update to Tomcat 10.1.25
</description>
<package>bind</package>
<package>bouncycastle</package>
<package>java-11-openjdk</package>
<package>java-17-openjdk</package>
<package>java-1_8_0-openjdk</package>
<package>java-21-openjdk</package>
<package>python-h5py</package>
<package>python-h5py:openmpi4</package>
<package>python-pytest-mpi</package>
<package>tomcat</package>
<package>tomcat10</package>
<seperate_build_arch/>
</patchinfo>