Security update for java-25-openjdk
| Announcement ID: | SUSE-SU-2026:1704-1 |
|---|---|
| Release Date: | 2026-05-06T10:28:15Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves nine vulnerabilities and contains one feature can now be installed.
Description:
This update for java-25-openjdk fixes the following issues:
Update to upstream tag jdk-25.0.3+9 (April 2026 CPU).
Security issues fixed:
- CVE-2026-22007: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain unauthorized read access to a subset of accessible data (bsc#1262490).
- CVE-2026-22008: Libraries: unauthenticated attacker with network access via multiple protocols can gain unauthorized update, insert or delete access to data (bsc#1262493).
- CVE-2026-22013: JGSS: unauthenticated attacker with network access via multiple protocols can gain unauthorized access to critical data (bsc#1262494).
- CVE-2026-22016: JAXP: unauthenticated attacker with network access via multiple protocols can gain unauthorized to access critical data (bsc#1262495).
- CVE-2026-22018: Libraries: unauthenticated attacker with network access via multiple protocols can cause a partial denial of service (bsc#1262496).
- CVE-2026-22021: JSSE: unauthenticated attacker with network access via HTTPS can cause a partial denial of service (bsc#1262497).
- CVE-2026-23865: freetype2: integer overflow in the
tt_var_load_item_variation_storefunction allows for an out-of-bounds read when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts(bsc#1259118). - CVE-2026-34268: Security: unauthenticated attacker with logon to the infrastructure where java executes can gain unauthorized read access to a subset of data (bsc#1262500).
- CVE-2026-34282: Networking: unauthenticated attacker with network access via multiple protocols can cause a hang or frequently repeatable crash (bsc#1262501).
Other updates and bugfixes:
- Provide the timezone-java and tzdata-java (jsc#PED-15898).
- Migrate to the new logic of FIPS patch developed by RedHat in https://github.com/rh-openjdk/jdk/tree/fips-25u.
- Add the sources of /nss-native-fips-key-import-export-adapter.
- This native library is an adapter for OpenJDK to use the NSS PKCS #11 software token (libsoftokn3.so) in FIPS mode.
- Allow overriding of gcc name.
- Don't make missing system crypto-policies fatal.
- Add create-crypto-properties-files.bash that generates during the build the config files for different fips and non-fips scenarios.
- Add TestSecurityProperties.java to test the loading of system security properties where applicable.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-1704=1
Package List:
-
Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- java-25-openjdk-25.0.3.0-150700.15.10.1
- java-25-openjdk-headless-debuginfo-25.0.3.0-150700.15.10.1
- java-25-openjdk-debuginfo-25.0.3.0-150700.15.10.1
- java-25-openjdk-devel-debuginfo-25.0.3.0-150700.15.10.1
- java-25-openjdk-demo-25.0.3.0-150700.15.10.1
- java-25-openjdk-devel-25.0.3.0-150700.15.10.1
- java-25-openjdk-headless-25.0.3.0-150700.15.10.1
References:
- https://www.suse.com/security/cve/CVE-2026-22007.html
- https://www.suse.com/security/cve/CVE-2026-22008.html
- https://www.suse.com/security/cve/CVE-2026-22013.html
- https://www.suse.com/security/cve/CVE-2026-22016.html
- https://www.suse.com/security/cve/CVE-2026-22018.html
- https://www.suse.com/security/cve/CVE-2026-22021.html
- https://www.suse.com/security/cve/CVE-2026-23865.html
- https://www.suse.com/security/cve/CVE-2026-34268.html
- https://www.suse.com/security/cve/CVE-2026-34282.html
- https://bugzilla.suse.com/show_bug.cgi?id=1259118
- https://bugzilla.suse.com/show_bug.cgi?id=1262490
- https://bugzilla.suse.com/show_bug.cgi?id=1262493
- https://bugzilla.suse.com/show_bug.cgi?id=1262494
- https://bugzilla.suse.com/show_bug.cgi?id=1262495
- https://bugzilla.suse.com/show_bug.cgi?id=1262496
- https://bugzilla.suse.com/show_bug.cgi?id=1262497
- https://bugzilla.suse.com/show_bug.cgi?id=1262500
- https://bugzilla.suse.com/show_bug.cgi?id=1262501
- https://jira.suse.com/browse/PED-15898