{"affected":[{"ecosystem_specific":{"binaries":[{"java-1_8_0-ibm-devel":"1.8.0_sr8.25-30.123.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"java-1_8_0-ibm","purl":"pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0_sr8.25-30.123.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-ibm":"1.8.0_sr8.25-30.123.1","java-1_8_0-ibm-alsa":"1.8.0_sr8.25-30.123.1","java-1_8_0-ibm-devel":"1.8.0_sr8.25-30.123.1","java-1_8_0-ibm-plugin":"1.8.0_sr8.25-30.123.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"java-1_8_0-ibm","purl":"pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0_sr8.25-30.123.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-ibm":"1.8.0_sr8.25-30.123.1","java-1_8_0-ibm-alsa":"1.8.0_sr8.25-30.123.1","java-1_8_0-ibm-devel":"1.8.0_sr8.25-30.123.1","java-1_8_0-ibm-plugin":"1.8.0_sr8.25-30.123.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"java-1_8_0-ibm","purl":"pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0_sr8.25-30.123.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for java-1_8_0-ibm fixes the following issues:\n\nUpdate to Java 8.0 Service Refresh 8 Fix Pack 25 (bsc#1223470):\n\n- CVE-2023-38264: Fixed Object Request Broker (ORB) denial of service (bsc#1224164). \n- CVE-2024-21094: Fixed C2 compilation fails with 'Exceeded _node_regs array' (bsc#1222986). \n- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (bsc#1222983). \n- CVE-2024-21085: Fixed Pack200 excessive memory allocation (bsc#1222984).\n- CVE-2024-21011: Fixed Long Exception message leading to crash (bsc#1222979). \n- CVE-2024-21012: Fixed HTTP/2 client improper reverse DNS lookup (bsc#1222987). \n","id":"SUSE-SU-2024:1845-1","modified":"2024-05-29T19:41:10Z","published":"2024-05-29T19:41:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241845-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223470"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224164"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-21011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-21012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-21068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-21085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-21094"}],"related":["CVE-2023-38264","CVE-2024-21011","CVE-2024-21012","CVE-2024-21068","CVE-2024-21085","CVE-2024-21094"],"summary":"Security update for java-1_8_0-ibm","upstream":["CVE-2023-38264","CVE-2024-21011","CVE-2024-21012","CVE-2024-21068","CVE-2024-21085","CVE-2024-21094"]}