Critical Java 8 OpenJDK security update patches 3 vulnerabilities (CVE-2025-21587, CVE-2025-30691, CVE-2025-30698) with CVSS scores up to 9.1. Learn how to protect your SUSE Linux systems now.
Why This Update Matters
A newly released security patch for Java 1.8.0 OpenJDK addresses three critical vulnerabilities affecting SUSE Linux Enterprise Server and High Performance Computing systems.
With CVSS scores up to 9.1, these flaws could allow unauthorized data manipulation, denial-of-service attacks, and compromised system integrity.
🔒 Fixed Security Vulnerabilities
CVE-2025-21587 (CVSS 9.1) – Exploits the JSSE component, enabling attackers to create, delete, or modify critical data.
CVE-2025-30691 (CVSS 6.3) – Targets the Compiler component, allowing unauthorized changes to Java SE data.
CVE-2025-30698 (CVSS 6.3) – Impacts the 2D component, leading to data leaks and partial DoS attacks.
Affected Systems:
SUSE Linux Enterprise Server 12 SP5 (LTSS & Extended Security)
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise High Performance Computing 12 SP5
🛠️ How to Install the Update
For SUSE Linux Enterprise systems, apply the patch via:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1524=1Or use YaST online_update for automated patching.
💡 Additional Fixes & Improvements
This update (jdk8u452) also resolves non-security issues, including:
TLS certificate distrust for Camerfirma Root CAs
Timezone data updates to 2025a
Jar signing warnings for removed entries
Enhanced Deflater operations and XML Transformer fixes
📌 Pro Tip: Enterprises relying on Java for critical applications should prioritize this update due to its high-risk vulnerabilities.
🔗 References & Further Reading
Need Help? Consult your enterprise IT security team or SUSE support for deployment guidance.

Nenhum comentário:
Postar um comentário