Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03262-1 advisory.
Update to Java 8.0 Service Refresh 8 Fix Pack 50.
Security issues fixed:
- Oracle July 15 2025 CPU (bsc#1247754).
- CVE-2025-30749: heap corruption allows unauthenticated attacker with network access to compromise and takeover Java applications that load and run untrusted code (bsc#1246595).
- CVE-2025-30754: incomplete handshake allows unauthenticated attacker with network access via TLS to gain unauthorized update, insert, delete and read access to sensitive data (bsc#1246598).
- CVE-2025-30761: issue in the Scripting component allows unauthenticated attacker with network access to gain unauthorized creation, deletion or modification access to critical data (bsc#1246580).
- CVE-2025-50059: issue in the Networking component allows unauthenticated attacker with network access to gain unauthorized access to critical data (bsc#1246575).
- CVE-2025-50106: Glyph out-of-memory access allows unauthenticated attacker with network access to compromise and takeover Java applications that load and run untrusted code (bsc#1246584).
Other issues fixed:
- Class Libraries:
- Oracle Security Fix 8348989: Better Glyph drawing.
- Removal of Baltimore root certificate and TWO CAMERFIRMA root CA certificates from CACERTS.
- Update timezone information to the latest TZDATA2025B.
- Java Virtual Machine:
- Assertion failure at copyforwardscheme.cpp.
- JIT Compiler:
- GC assert due to an invalid object reference.
- SIGILL from JIT compiled method.
- Unexpected behaviour with very large arrays.
- Security:
- Deserialization of a serialized RSAPrivateCrtKey is throwing an exception.
- EDDSAsignature fails when doing multiple update.
- HTTPS channel binding support.
- IBMJCEPlus provider supports post quantum cryptography algorithms ML-KEM (key encapsulation) and ML-DSA (digital signature).
- Key certificate management: Extended key usage cannot be set without having key usage extension in certificate request.
- MessageDigest.update API does not throw the correct exception.
- Oracle Security Fix 8349594: Enhance TLS protocol support.
- Problem getting key in PKCS12 keystore on MAC.
- TLS support for the EDDSA signature algorithm.
- Wrong algorithm name returned for EDDSA keys.
- z/OS Extentions:
- IBMJCEHybridException with hybrid provider in GCM mode.
Tenable has extracted the preceding description block directly from the SUSE security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: suse_SU-2025-03262-1.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-alsa, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-plugin, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-devel, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-demo, p-cpe:/a:novell:suse_linux:java-1_8_0-ibm-src
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 9/18/2025
Vulnerability Publication Date: 7/15/2025