File _patchinfo of Package patchinfo.40563
<patchinfo incident="40563">
<issue tracker="cve" id="2025-30749"/>
<issue tracker="cve" id="2025-50106"/>
<issue tracker="cve" id="2025-30761"/>
<issue tracker="cve" id="2025-30754"/>
<issue tracker="bnc" id="1246580">VUL-0: CVE-2025-30761: java-10-openjdk,java-11-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-9-openjdk: Improve scripting supports (Oracle CPU 2025-07)</issue>
<issue tracker="bnc" id="1246806">trackerbug: packages embed rebuild-counter</issue>
<issue tracker="bnc" id="1246584">VUL-0: CVE-2025-50106: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)</issue>
<issue tracker="bnc" id="1246598">VUL-0: CVE-2025-30754: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: openjdk: incomplete handshake may lead to weakening TLS protections</issue>
<issue tracker="bnc" id="1246595">VUL-0: CVE-2025-30749: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: openjdk: several scenarios can lead to heap corruption</issue>
<packager>fstrba</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for java-1_8_0-openjdk</summary>
<description>This update for java-1_8_0-openjdk fixes the following issues:
Update to version jdk8u462 (icedtea-3.36.0).
Security issues fixed:
- CVE-2025-30749: heap corruption allows unauthenticated attacker with network access to compromise and takeover Java
applications that load and run untrusted code (bsc#1246595).
- CVE-2025-30754: incomplete handshake allows unauthenticated attacker with network access via TLS to gain unauthorized
update, insert, delete and read access to sensitive data (bsc#1246598).
- CVE-2025-30761: issue in Scripting component allows unauthenticated attacker with network access to gain
unauthorized creation, deletion or modification access to critical data (bsc#1246580).
- CVE-2025-50106: Glyph out-of-memory access allows unauthenticated attacker with network access to compromise and
takeover Java applications that load and run untrusted code (bsc#1246584).
Other issues fixed:
- Import of OpenJDK 8 u462 build 08
+ JDK-8026976: ECParameters, Point does not match field size.
+ JDK-8071996: split_if accesses NULL region of ConstraintCast.
+ JDK-8186143: keytool -ext option doesn't accept wildcards for DNS subject alternative names.
+ JDK-8186787: clang-4.0 SIGSEGV in Unsafe_PutByte.
+ JDK-8248001: javadoc generates invalid HTML pages whose ftp:// links are broken.
+ JDK-8278472: Invalid value set to CANDIDATEFORM structure.
+ JDK-8293107: GHA: Bump to Ubuntu 22.04.
+ JDK-8303770: Remove Baltimore root certificate expiring in May 2025.
+ JDK-8309841: Jarsigner should print a warning if an entry is removed.
+ JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract.
+ JDK-8345625: Better HTTP connections.
+ JDK-8346887: DrawFocusRect() may cause an assertion failure.
+ JDK-8349111: Enhance Swing supports.
+ JDK-8350498: Remove two Camerfirma root CA certificates.
+ JDK-8352716: (tz) Update Timezone Data to 2025b.
+ JDK-8353433: XCG currency code not recognized in JDK 8u.
+ JDK-8356096: ISO 4217 Amendment 179 Update.
+ JDK-8359170: Add 2 TLS and 2 CS Sectigo roots.
- Backports
+ JDK-8358538: Update GHA Windows runner to 2025.
- JDK-8354941: Build failure with glibc 2.42 due to uabs() name collision.
</description>
</patchinfo>