SUSE SLES15 / openSUSE 15 Security Update : java-1_8_0-ibm (SUSE-SU-2025:03262-1)

high Nessus Plugin ID 265423

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03262-1 advisory.

Update to Java 8.0 Service Refresh 8 Fix Pack 50.

Security issues fixed:

- Oracle July 15 2025 CPU (bsc#1247754).
- CVE-2025-30749: heap corruption allows unauthenticated attacker with network access to compromise and takeover Java applications that load and run untrusted code (bsc#1246595).
- CVE-2025-30754: incomplete handshake allows unauthenticated attacker with network access via TLS to gain unauthorized update, insert, delete and read access to sensitive data (bsc#1246598).
- CVE-2025-30761: issue in the Scripting component allows unauthenticated attacker with network access to gain unauthorized creation, deletion or modification access to critical data (bsc#1246580).
- CVE-2025-50059: issue in the Networking component allows unauthenticated attacker with network access to gain unauthorized access to critical data (bsc#1246575).
- CVE-2025-50106: Glyph out-of-memory access allows unauthenticated attacker with network access to compromise and takeover Java applications that load and run untrusted code (bsc#1246584).

Other issues fixed:

- Class Libraries:
- Oracle Security Fix 8348989: Better Glyph drawing.
- Removal of Baltimore root certificate and TWO CAMERFIRMA root CA certificates from CACERTS.
- Update timezone information to the latest TZDATA2025B.
- Java Virtual Machine:
- Assertion failure at copyforwardscheme.cpp.
- JIT Compiler:
- GC assert due to an invalid object reference.
- SIGILL from JIT compiled method.
- Unexpected behaviour with very large arrays.
- Security:
- Deserialization of a serialized RSAPrivateCrtKey is throwing an exception.
- EDDSAsignature fails when doing multiple update.
- HTTPS channel binding support.
- IBMJCEPlus provider supports post quantum cryptography algorithms ML-KEM (key encapsulation) and ML-DSA (digital signature).
- Key certificate management: Extended key usage cannot be set without having key usage extension in certificate request.
- MessageDigest.update API does not throw the correct exception.
- Oracle Security Fix 8349594: Enhance TLS protocol support.
- Problem getting key in PKCS12 keystore on MAC.
- TLS support for the EDDSA signature algorithm.
- Wrong algorithm name returned for EDDSA keys.
- z/OS Extentions:
- IBMJCEHybridException with hybrid provider in GCM mode.

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1246575

https://bugzilla.suse.com/1246580

https://bugzilla.suse.com/1246595

https://bugzilla.suse.com/1246598

https://www.suse.com/security/cve/CVE-2025-30749

https://www.suse.com/security/cve/CVE-2025-30754

https://www.suse.com/security/cve/CVE-2025-30761

https://www.suse.com/security/cve/CVE-2025-50059

https://bugzilla.suse.com/1246584

https://www.suse.com/security/cve/CVE-2025-50106

https://bugzilla.suse.com/1247754

http://www.nessus.org/u?c7348a5a

Plugin Details

Severity: High

ID: 265423

File Name: suse_SU-2025-03262-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/19/2025

Updated: 9/19/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-50106

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-alsa, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-plugin, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-devel, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-demo, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-src

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/18/2025

Vulnerability Publication Date: 7/15/2025

Reference Information

CVE: CVE-2025-30749, CVE-2025-30754, CVE-2025-30761, CVE-2025-50059, CVE-2025-50106

SuSE: SUSE-SU-2025:03262-1