Bug 1222987 (CVE-2024-21012)

Summary: VUL-0: CVE-2024-21012: java-10-openjdk,java-11-openjdk,java-17-openjdk,java-1_7_0-openjdk,java-1_8_0-ibm,java-1_8_0-openj9,java-1_8_0-openjdk,java-21-openjdk,java-9-openjdk: OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708)
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Minor    
Priority: P3 - Medium CC: camila.matos, fstrba, pmonrealgonzalez
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/402088/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-21012:3.7:(AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-04-17 17:41:19 UTC
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking).  Supported versions that are affected are Oracle Java SE: 11.0.22, 17.0.10, 21.0.2, 22; Oracle GraalVM for JDK: 17.0.10, 21.0.2, 22; Oracle GraalVM Enterprise Edition: 20.3.13 and  21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

References:
https://www.oracle.com/security-alerts/cpuapr2024.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-21012
https://www.cve.org/CVERecord?id=CVE-2024-21012
https://bugzilla.redhat.com/show_bug.cgi?id=2274975
Comment 6 Maintenance Automation 2024-04-26 16:30:26 UTC
SUSE-SU-2024:1452-1: An update that solves five vulnerabilities and has one security fix can now be installed.

Category: security (low)
Bug References: 1213470, 1222979, 1222983, 1222984, 1222986, 1222987
CVE References: CVE-2024-21011, CVE-2024-21012, CVE-2024-21068, CVE-2024-21085, CVE-2024-21094
Maintenance Incident: [SUSE:Maintenance:33457](https://smelt.suse.de/incident/33457/)
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 java-11-openjdk-11.0.23.0-3.75.1
SUSE Linux Enterprise Server 12 SP5 (src):
 java-11-openjdk-11.0.23.0-3.75.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 java-11-openjdk-11.0.23.0-3.75.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2024-05-06 08:30:08 UTC
SUSE-SU-2024:1499-1: An update that solves four vulnerabilities and has one security fix can now be installed.

Category: security (low)
Bug References: 1213470, 1222979, 1222983, 1222986, 1222987
CVE References: CVE-2024-21011, CVE-2024-21012, CVE-2024-21068, CVE-2024-21094
Maintenance Incident: [SUSE:Maintenance:33458](https://smelt.suse.de/incident/33458/)
Sources used:
openSUSE Leap 15.4 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
openSUSE Leap 15.5 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
Basesystem Module 15-SP5 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Manager Proxy 4.3 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Manager Retail Branch Server 4.3 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1
SUSE Manager Server 4.3 (src):
 java-17-openjdk-17.0.11.0-150400.3.42.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Maintenance Automation 2024-05-06 08:30:13 UTC
SUSE-SU-2024:1498-1: An update that solves five vulnerabilities and has one security fix can now be installed.

Category: security (low)
Bug References: 1213470, 1222979, 1222983, 1222984, 1222986, 1222987
CVE References: CVE-2024-21011, CVE-2024-21012, CVE-2024-21068, CVE-2024-21085, CVE-2024-21094
Maintenance Incident: [SUSE:Maintenance:33455](https://smelt.suse.de/incident/33455/)
Sources used:
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Manager Proxy 4.3 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Manager Retail Branch Server 4.3 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Manager Server 4.3 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Enterprise Storage 7.1 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
openSUSE Leap 15.5 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
Basesystem Module 15-SP5 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Package Hub 15 15-SP5 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 java-11-openjdk-11.0.23.0-150000.3.113.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Fridrich Strba 2024-05-24 06:47:58 UTC
All relevant packages submitted, assigning back to security.
Comment 13 Maintenance Automation 2024-05-29 20:30:08 UTC
SUSE-SU-2024:1845-1: An update that solves six vulnerabilities and has one security fix can now be installed.

Category: security (important)
Bug References: 1222979, 1222983, 1222984, 1222986, 1222987, 1223470, 1224164
CVE References: CVE-2023-38264, CVE-2024-21011, CVE-2024-21012, CVE-2024-21068, CVE-2024-21085, CVE-2024-21094
Maintenance Incident: [SUSE:Maintenance:33980](https://smelt.suse.de/incident/33980/)
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Fridrich Strba 2024-06-12 06:12:49 UTC
The submissions to SUSE:ALP:Source:Standard:1.0 have been done ~2wks ago:
https://build.suse.de/request/show/332637
https://build.suse.de/request/show/332636
https://build.suse.de/request/show/332635
https://build.suse.de/request/show/332634
Just that no action was done on it from the maintenance part