SUSE: 2024:2568-1 important: mockito, snakeyaml, testng Security Advisory Updates
Summary
##
This update for mockito, snakeyaml, testng fixes the following issues:
mockito was updated to version 5.11.0:
* Added bundle manifest to the mockito-core artifact
* Mockito 5 is making core changes to ensure compatibility with future JDK
versions.
* Switch the Default MockMaker to mockito-inline (not applicable to mockito-
android)
* Mockito 2.7.6 introduced the mockito-inline mockmaker based on the "inline
bytecode" principle, offering compatibility advantages over the subclass
mockmaker
* This change avoids JDK restrictions, such as violating module boundaries and
leaking subclass creation
* Legitimate use cases for the subclass mockmaker:
* Scenarios where the inline mockmaker does not function, such as on Graal
VM's native image
* If avoiding mocking final classes, the subclass mockmaker remains a viable
option, although issues may arise on JDK 17+
* Mockito aims to support both mockmakers, allowing users to choose based on
their requirements.
* Update the Minimum Supported Java Version to 11
* Mockito 5 raised the minimum supported Java version to 11
* Community member @reta contributed to this change.
* Users still on JDK 8 can continue using Mockito 4, with minimal API
differences between versions
* New type() Method on ArgumentMatcher
* The ArgumentMatcher interface now includes a new type() method to support
varargs methods, addressing previous limitations
* Users can now differentiate between matching calls with any exact number of
arguments or match any number of arguments
* Mockito 5 provides a default implementation of the new method, ensuring
backward compatibility.
* No obligation for users to implement the new method; Mockito 5 considers
Void.type by default for varargs handling
* ArgumentCaptor is now fully type-aware, enabling capturing specific
subclasses on a generic method.
* byte-buddy does not bundle asm, but uses objectweb-asm as external library
snake-yaml was updated to version 2.2:
* Changes of version 2.2:
* Define default scalar style as PLAIN (for polyglot Maven)
* Add missing 'exports org.yaml.snakeyaml.inspector' to module-info.java
* Changes of version 2.1:
* Heavy Allocation in Emitter.analyzeScalar(String) due to Regex Overhead
* Use identity in toString() for sequences to avoid OutOfMemoryError
* NumberFormatException from SnakeYAML due to int overflow for corrupt YAML
version
* Document size limit should be applied to single document notthe whole input
stream
* Detect invalid Unicode code point (thanks to Tatu Saloranta)
* Remove Trusted*Inspector classes from main sources tree
* Changes of version 2.0:
* Rollback to Java 7 target
* Add module-info.java
* Migrate to Java 8
* Remove many deprecated constructors
* Remove long deprecated methods in FlowStyle
* Do not allow global tags by default
* Yaml.LoadAs() signature to support Class super T> type instead of Class
References
* bsc#1205628
Cross-
* CVE-2022-4065
CVSS scores:
* CVE-2022-4065 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-4065 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-4065 ( NVD ): 5.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module 4.3
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
##
* https://www.suse.com/security/cve/CVE-2022-4065.html
* https://bugzilla.suse.com/show_bug.cgi?id=1205628