SUSE Security Update: Security update for java-17-openjdk ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:4079-1 Rating: moderate References: #1203476 #1204468 #1204472 #1204473 #1204475 #1204480 Cross-References: CVE-2022-21618 CVE-2022-21619 CVE-2022-21624 CVE-2022-21628 CVE-2022-39399 CVSS scores: CVE-2022-21618 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-21618 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-21619 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-21619 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-21624 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-21624 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-21628 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2022-21628 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2022-39399 (NVD) : 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVE-2022-39399 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.3 SUSE Manager Retail Branch Server 4.3 SUSE Manager Server 4.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has one errata is now available. Description: This update for java-17-openjdk fixes the following issues: - Update to jdk-17.0.5+8 (October 2022 CPU) - CVE-2022-39399: Improve HTTP/2 client usage(bsc#1204480) - CVE-2022-21628: Better HttpServer service (bsc#1204472) - CVE-2022-21624: Enhance icon presentations (bsc#1204475) - CVE-2022-21619: Improve NTLM support (bsc#1204473) - CVE-2022-21618: Wider MultiByte (bsc#1204468) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-4079=1 - SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-4079=1 Package List: - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): java-17-openjdk-17.0.5.0-150400.3.6.1 java-17-openjdk-accessibility-17.0.5.0-150400.3.6.1 java-17-openjdk-accessibility-debuginfo-17.0.5.0-150400.3.6.1 java-17-openjdk-debuginfo-17.0.5.0-150400.3.6.1 java-17-openjdk-debugsource-17.0.5.0-150400.3.6.1 java-17-openjdk-demo-17.0.5.0-150400.3.6.1 java-17-openjdk-devel-17.0.5.0-150400.3.6.1 java-17-openjdk-devel-debuginfo-17.0.5.0-150400.3.6.1 java-17-openjdk-headless-17.0.5.0-150400.3.6.1 java-17-openjdk-headless-debuginfo-17.0.5.0-150400.3.6.1 java-17-openjdk-jmods-17.0.5.0-150400.3.6.1 java-17-openjdk-src-17.0.5.0-150400.3.6.1 - openSUSE Leap 15.4 (noarch): java-17-openjdk-javadoc-17.0.5.0-150400.3.6.1 - SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64): java-17-openjdk-17.0.5.0-150400.3.6.1 java-17-openjdk-debuginfo-17.0.5.0-150400.3.6.1 java-17-openjdk-debugsource-17.0.5.0-150400.3.6.1 java-17-openjdk-demo-17.0.5.0-150400.3.6.1 java-17-openjdk-devel-17.0.5.0-150400.3.6.1 java-17-openjdk-devel-debuginfo-17.0.5.0-150400.3.6.1 java-17-openjdk-headless-17.0.5.0-150400.3.6.1 java-17-openjdk-headless-debuginfo-17.0.5.0-150400.3.6.1 References: https://www.suse.com/security/cve/CVE-2022-21618.html https://www.suse.com/security/cve/CVE-2022-21619.html https://www.suse.com/security/cve/CVE-2022-21624.html https://www.suse.com/security/cve/CVE-2022-21628.html https://www.suse.com/security/cve/CVE-2022-39399.html https://bugzilla.suse.com/1203476 https://bugzilla.suse.com/1204468 https://bugzilla.suse.com/1204472 https://bugzilla.suse.com/1204473 https://bugzilla.suse.com/1204475 https://bugzilla.suse.com/1204480