SUSE has released an urgent security update for Java 11 OpenJDK addressing 3 critical vulnerabilities (CVSS scores up to 9.1) affecting data integrity and system access. Learn how to patch CVE-2025-21587, CVE-2025-30691, and CVE-2025-30698 across SUSE Linux, Enterprise Storage, and OpenSUSE Leap 15.6.
1. Executive Summary
A high-priority security update (SUSE-SU-2025:01487-2) was released on June 16, 2025, patching three critical vulnerabilities in Java 11 OpenJDK. These flaws could allow unauthorized data access, modification, or denial-of-service (DoS) attacks. Affected systems include:
SUSE Linux Enterprise Server 15 SP3-SP7
OpenSUSE Leap 15.6
SUSE Manager, Enterprise Storage, and SAP Applications
Key Risks:
CVE-2025-21587 (CVSS 9.1): JSSE security bypass enabling data tampering.
CVE-2025-30691 (CVSS 6.3): Oracle Java SE Compiler vulnerability exposing sensitive data.
CVE-2025-30698 (CVSS 6.3): Java 2D flaw leading to DoS or unauthorized access.
2. Vulnerability Deep Dive
2.1 Critical CVEs and Impact
| CVE ID | CVSS Score | Risk | Affected Component |
|---|---|---|---|
| CVE-2025-21587 | 9.1 | Data tampering | JSSE (Java Secure Socket Extension) |
| CVE-2025-30691 | 6.3 | Data leakage | Java SE Compiler |
| CVE-2025-30698 | 6.3 | DoS/Data access | Java 2D API |
Why Patch Immediately?
Exploits could compromise SAP applications, cloud infrastructure, and enterprise systems.
Financial and healthcare sectors are high-risk targets due to Java’s widespread use.
3. Patch Instructions
3.1 Recommended Update Methods
YaST Online Update (GUI)
Command Line:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-2025-1487=1
Manual Download: SUSE Security Portal
3.2 Affected Packages
java-11-openjdk(v11.0.27+6)java-11-openjdk-headlessjava-11-openjdk-devel
Full package list: See Section 7.
4. Additional Fixes & Improvements
This update also includes 20+ upstream bug fixes, such as:
JDK-8337692: Enhanced TLS 1.3 support.
JDK-8347965: Updated timezone data (2025a).
JDK-8343786: macOS/Xcode compatibility fixes.
5. Frequently Asked Questions (FAQ)
Q: Is this update mandatory for compliance?
A: Yes, especially for PCI-DSS, HIPAA, or GDPR-regulated systems due to data integrity risks.
Q: How do I verify the patch is applied?
A: Run:
rpm -q java-11-openjdk --changelog | grep CVE-2025-21587
Q: Are containers affected?
A: Yes, if using vulnerable OpenJDK images. Update base images immediately.
7. Package List (Condensed)
| Product | Package |
|---|---|
| SUSE Linux Enterprise 15 SP5 | java-11-openjdk-11.0.27.0 |
| OpenSUSE Leap 15.6 | java-11-openjdk-headless |
| SUSE Manager 4.3 | java-11-openjdk-devel |
| Full list |
8. Conclusion & Next Steps
Immediate Actions:
Prioritize patching systems running Java 11 OpenJDK.
Audit dependencies (e.g., Docker, Kubernetes) for vulnerable images.
Monitor logs for exploitation attempts.
Need enterprise support? SUSE Security Services offers vulnerability assessments and patch management.

Nenhum comentário:
Postar um comentário