Vulnerability Scan Report for registry.suse.com/bci/openjdk-devel:17-16.52
OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: May 15, 2025 08:43

OpenJDK 17 development container based on the SLE Base Container Image.
Last scanned on: May 15, 2025 08:43
Package Name | Severity | Status | Description | Reference links | |
---|---|---|---|---|---|
glibc | LOW | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2025:0562-1 Installed Version: 2.31-150300.63.1 Fixed Version: 2.31-150300.92.1 This update for glibc fixes the following issues: - CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282) |
||
glibc | UNKNOWN | fixed |
Security update for glibc Vulnerability ID: SUSE-SU-2024:0870-1 Installed Version: 2.31-150300.63.1 Fixed Version: 2.31-150300.68.1 This update for glibc fixes the following issues: Security issues fixed: - qsort: harden handling of degenerated / non transient compare function (bsc#1218866) Other issues fixed: - getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163) - aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113) |
||
httpcomponents-client | MEDIUM | fixed |
Security update for httpcomponents-client, httpcomponents-core Vulnerability ID: SUSE-SU-2024:4036-1 Installed Version: 4.5.12-150200.3.6.4 Fixed Version: 4.5.14-150200.3.9.1 This update for httpcomponents-client, httpcomponents-core fixes the following issues: httpcomponents-client: - Update to version 4.5.14 * HTTPCLIENT-2206: Corrected resource de-allocation by fluent response objects. * HTTPCLIENT-2174: URIBuilder to return a new empty list instead of unmodifiable Collections#emptyList. * Don't retry requests in case of NoRouteToHostException. * HTTPCLIENT-2144: RequestBuilder fails to correctly copy charset of requests with form url-encoded body. * PR #269: 4.5.x use array fill and more. + Use Arrays.fill(). + Remove redundant modifiers. + Use Collections.addAll() and Collection.addAll() APIs instead of loops. + Remove redundant returns. + No need to explicitly declare an array when calling a vararg method. + Remote extra semicolons (;). + Use a 'L' instead of 'l' to make long literals more readable. * PublicSuffixListParser.parseByType(Reader) allocates but does not use a 256 char StringBuilder. * Incorrect handling of malformed authority component by URIUtils#extractHost (bsc#1177488, CVE-2020-13956). * Avoid updating Content-Length header in a 304 response. * Bug fix: BasicExpiresHandler is annotated as immutable but is not (#239) * HTTPCLIENT-2076: Fixed NPE in LaxExpiresHandler. httpcomponents-core: - Upgraded to version 4.4.14 * PR #231: 4.4.x Use better map apis and more. + Remove redundant modifiers. + Use Collections.addAll() API instead of loops. + Remove redundant returns. + No need to explicitly declare an array when calling a vararg method. + Remote extra semicolons (;). * Bug fix: Non-blocking TLSv1.3 connections can end up in an infinite event spin when closed concurrently by the local and the remote endpoints. * HTTPCORE-647: Non-blocking connection terminated due to 'java.io.IOException: Broken pipe' can enter an infinite loop flushing buffered output data. * PR #201, HTTPCORE-634: Fix race condition in AbstractConnPool that can cause internal state corruption when persistent connections are manually removed from the pool. |
||
httpcomponents-core | MEDIUM | fixed |
Security update for httpcomponents-client, httpcomponents-core Vulnerability ID: SUSE-SU-2024:4036-1 Installed Version: 4.4.13-150200.3.6.4 Fixed Version: 4.4.14-150200.3.9.1 This update for httpcomponents-client, httpcomponents-core fixes the following issues: httpcomponents-client: - Update to version 4.5.14 * HTTPCLIENT-2206: Corrected resource de-allocation by fluent response objects. * HTTPCLIENT-2174: URIBuilder to return a new empty list instead of unmodifiable Collections#emptyList. * Don't retry requests in case of NoRouteToHostException. * HTTPCLIENT-2144: RequestBuilder fails to correctly copy charset of requests with form url-encoded body. * PR #269: 4.5.x use array fill and more. + Use Arrays.fill(). + Remove redundant modifiers. + Use Collections.addAll() and Collection.addAll() APIs instead of loops. + Remove redundant returns. + No need to explicitly declare an array when calling a vararg method. + Remote extra semicolons (;). + Use a 'L' instead of 'l' to make long literals more readable. * PublicSuffixListParser.parseByType(Reader) allocates but does not use a 256 char StringBuilder. * Incorrect handling of malformed authority component by URIUtils#extractHost (bsc#1177488, CVE-2020-13956). * Avoid updating Content-Length header in a 304 response. * Bug fix: BasicExpiresHandler is annotated as immutable but is not (#239) * HTTPCLIENT-2076: Fixed NPE in LaxExpiresHandler. httpcomponents-core: - Upgraded to version 4.4.14 * PR #231: 4.4.x Use better map apis and more. + Remove redundant modifiers. + Use Collections.addAll() API instead of loops. + Remove redundant returns. + No need to explicitly declare an array when calling a vararg method. + Remote extra semicolons (;). * Bug fix: Non-blocking TLSv1.3 connections can end up in an infinite event spin when closed concurrently by the local and the remote endpoints. * HTTPCORE-647: Non-blocking connection terminated due to 'java.io.IOException: Broken pipe' can enter an infinite loop flushing buffered output data. * PR #201, HTTPCORE-634: Fix race condition in AbstractConnPool that can cause internal state corruption when persistent connections are manually removed from the pool. |
||
java-17-openjdk | HIGH | fixed |
Security update for java-17-openjdk Vulnerability ID: SUSE-SU-2024:2628-1 Installed Version: 17.0.10.0-150400.3.36.1 Fixed Version: 17.0.12.0-150400.3.45.1 This update for java-17-openjdk fixes the following issues: Updated to version 17.0.12+7 (July 2024 CPU): - CVE-2024-21131: Fixed a potential UTF8 size overflow (bsc#1228046). - CVE-2024-21138: Fixed an infinite loop due to excessive symbol length (bsc#1228047). - CVE-2024-21140: Fixed a pre-loop limit overflow in Range Check Elimination (bsc#1228048). - CVE-2024-21147: Fixed an out-of-bounds access in 2D image handling (bsc#1228052). - CVE-2024-21145: Fixed an index overflow in RangeCheckElimination (bsc#1228051). |