<div class="container">
<h1>Security update for java-1_8_0-openjdk</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:03120-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-09-09T15:10:05Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246580">bsc#1246580</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246584">bsc#1246584</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246595">bsc#1246595</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246598">bsc#1246598</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246806">bsc#1246806</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-30749.html">CVE-2025-30749</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-30754.html">CVE-2025-30754</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-30761.html">CVE-2025-30761</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-50106.html">CVE-2025-50106</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30749</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30749</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30749</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30754</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30754</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30754</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30761</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-30761</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.9</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-50106</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-50106</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 12 SP5 LTSS</li>
<li class="list-group-item">SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves four vulnerabilities and has one security fix can now be installed.</p>
<h2>Description:</h2>
<p>This update for java-1_8_0-openjdk fixes the following issues:</p>
<p>Update to version jdk8u462 (icedtea-3.36.0).</p>
<p>Security issues fixed:</p>
<ul>
<li>CVE-2025-30749: heap corruption allows unauthenticated attacker with network access to compromise and takeover Java
applications that load and run untrusted code (bsc#1246595).</li>
<li>CVE-2025-30754: incomplete handshake allows unauthenticated attacker with network access via TLS to gain unauthorized
update, insert, delete and read access to sensitive data (bsc#1246598).</li>
<li>CVE-2025-30761: issue in Scripting component allows unauthenticated attacker with network access to gain
unauthorized creation, deletion or modification access to critical data (bsc#1246580).</li>
<li>CVE-2025-50106: Glyph out-of-memory access allows unauthenticated attacker with network access to compromise and
takeover Java applications that load and run untrusted code (bsc#1246584).</li>
</ul>
<p>Other issues fixed:</p>
<ul>
<li>Import of OpenJDK 8 u462 build 08</li>
<li>JDK-8026976: ECParameters, Point does not match field size.</li>
<li>JDK-8071996: split_if accesses NULL region of ConstraintCast.</li>
<li>JDK-8186143: keytool -ext option doesn't accept wildcards for DNS subject alternative names.</li>
<li>JDK-8186787: clang-4.0 SIGSEGV in Unsafe_PutByte.</li>
<li>JDK-8248001: javadoc generates invalid HTML pages whose ftp:// links are broken.</li>
<li>JDK-8278472: Invalid value set to CANDIDATEFORM structure.</li>
<li>JDK-8293107: GHA: Bump to Ubuntu 22.04.</li>
<li>JDK-8303770: Remove Baltimore root certificate expiring in May 2025.</li>
<li>JDK-8309841: Jarsigner should print a warning if an entry is removed.</li>
<li>JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract.</li>
<li>JDK-8345625: Better HTTP connections.</li>
<li>JDK-8346887: DrawFocusRect() may cause an assertion failure.</li>
<li>JDK-8349111: Enhance Swing supports.</li>
<li>JDK-8350498: Remove two Camerfirma root CA certificates.</li>
<li>JDK-8352716: (tz) Update Timezone Data to 2025b.</li>
<li>JDK-8353433: XCG currency code not recognized in JDK 8u.</li>
<li>JDK-8356096: ISO 4217 Amendment 179 Update.</li>
<li>JDK-8359170: Add 2 TLS and 2 CS Sectigo roots.</li>
<li>Backports</li>
<li>JDK-8358538: Update GHA Windows runner to 2025.</li>
<li>JDK-8354941: Build failure with glibc 2.42 due to uabs() name collision.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Enterprise Server 12 SP5 LTSS
<br/>
<code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3120=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
<br/>
<code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3120=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
<ul>
<li>java-1_8_0-openjdk-debugsource-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-demo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-devel-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-headless-1.8.0.462-27.117.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
<ul>
<li>java-1_8_0-openjdk-debugsource-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-headless-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-demo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-devel-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-devel-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-demo-debuginfo-1.8.0.462-27.117.1</li>
<li>java-1_8_0-openjdk-headless-1.8.0.462-27.117.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-30749.html">https://www.suse.com/security/cve/CVE-2025-30749.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-30754.html">https://www.suse.com/security/cve/CVE-2025-30754.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-30761.html">https://www.suse.com/security/cve/CVE-2025-30761.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-50106.html">https://www.suse.com/security/cve/CVE-2025-50106.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246580">https://bugzilla.suse.com/show_bug.cgi?id=1246580</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246584">https://bugzilla.suse.com/show_bug.cgi?id=1246584</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246595">https://bugzilla.suse.com/show_bug.cgi?id=1246595</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246598">https://bugzilla.suse.com/show_bug.cgi?id=1246598</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246806">https://bugzilla.suse.com/show_bug.cgi?id=1246806</a>
</li>
</ul>
</div>