Security update for java-11-openjdk
| Announcement ID: | SUSE-SU-2026:1703-1 |
|---|---|
| Release Date: | 2026-05-06T08:45:05Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities and contains one feature can now be installed.
Description:
This update for java-11-openjdk fixes the following issues:
Upgrade to upstream tag jdk-11.0.31+11 (April 2026 CPU).
Security issues fixed:
- CVE-2026-22007: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain unauthorized read access to a subset of accessible data (bsc#1262490).
- CVE-2026-22013: JGSS: unauthenticated attacker with network access via multiple protocols can gain unauthorized access to critical data (bsc#1262494).
- CVE-2026-22016: JAXP: unauthenticated attacker with network access via multiple protocols can gain unauthorized to access critical data (bsc#1262495).
- CVE-2026-22018: Libraries: unauthenticated attacker with network access via multiple protocols can cause a partial denial of service (bsc#1262496).
- CVE-2026-22021: JSSE: unauthenticated attacker with network access via HTTPS can cause a partial denial of service (bsc#1262497).
- CVE-2026-23865: freetype2: integer overflow in the
tt_var_load_item_variation_storefunction allows for an out-of-bounds read when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts(bsc#1259118). - CVE-2026-34268: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain unauthorized read access to a subset of data (bsc#1262500).
- CVE-2026-34282: Networking: unauthenticated attacker with network access via multiple protocols can cause a hang or frequently repeatable crash (bsc#1262501).
Other updates and bugfixes:
- Provide the timezone-java and tzdata-java (jsc#PED-15898).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-1703=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1703=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- java-11-openjdk-headless-11.0.31.0-3.99.1
- java-11-openjdk-debuginfo-11.0.31.0-3.99.1
- java-11-openjdk-11.0.31.0-3.99.1
- java-11-openjdk-demo-11.0.31.0-3.99.1
- java-11-openjdk-devel-11.0.31.0-3.99.1
- java-11-openjdk-debugsource-11.0.31.0-3.99.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- java-11-openjdk-headless-11.0.31.0-3.99.1
- java-11-openjdk-debuginfo-11.0.31.0-3.99.1
- java-11-openjdk-11.0.31.0-3.99.1
- java-11-openjdk-demo-11.0.31.0-3.99.1
- java-11-openjdk-devel-11.0.31.0-3.99.1
- java-11-openjdk-debugsource-11.0.31.0-3.99.1
References:
- https://www.suse.com/security/cve/CVE-2026-22007.html
- https://www.suse.com/security/cve/CVE-2026-22013.html
- https://www.suse.com/security/cve/CVE-2026-22016.html
- https://www.suse.com/security/cve/CVE-2026-22018.html
- https://www.suse.com/security/cve/CVE-2026-22021.html
- https://www.suse.com/security/cve/CVE-2026-23865.html
- https://www.suse.com/security/cve/CVE-2026-34268.html
- https://www.suse.com/security/cve/CVE-2026-34282.html
- https://bugzilla.suse.com/show_bug.cgi?id=1259118
- https://bugzilla.suse.com/show_bug.cgi?id=1262490
- https://bugzilla.suse.com/show_bug.cgi?id=1262494
- https://bugzilla.suse.com/show_bug.cgi?id=1262495
- https://bugzilla.suse.com/show_bug.cgi?id=1262496
- https://bugzilla.suse.com/show_bug.cgi?id=1262497
- https://bugzilla.suse.com/show_bug.cgi?id=1262500
- https://bugzilla.suse.com/show_bug.cgi?id=1262501
- https://jira.suse.com/browse/PED-15898