{"affected":[{"ecosystem_specific":{"binaries":[{"java-1_8_0-ibm":"1.8.0_sr8.45-30.135.1","java-1_8_0-ibm-alsa":"1.8.0_sr8.45-30.135.1","java-1_8_0-ibm-devel":"1.8.0_sr8.45-30.135.1","java-1_8_0-ibm-plugin":"1.8.0_sr8.45-30.135.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"java-1_8_0-ibm","purl":"pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0_sr8.45-30.135.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"java-1_8_0-ibm":"1.8.0_sr8.45-30.135.1","java-1_8_0-ibm-alsa":"1.8.0_sr8.45-30.135.1","java-1_8_0-ibm-devel":"1.8.0_sr8.45-30.135.1","java-1_8_0-ibm-plugin":"1.8.0_sr8.45-30.135.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"java-1_8_0-ibm","purl":"pkg:rpm/suse/java-1_8_0-ibm&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.0_sr8.45-30.135.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for java-1_8_0-ibm fixes the following issues:\n\nUpdate to Java 8.0 Service Refresh 8 Fix Pack 45.\n\nSecurity issues fixed:\n\n- Oracle April 15 2025 CPU (bsc#1242208)\n\n  * CVE-2025-21587: unauthorized access, deletion and modification of critical data via the JSSE component\n    (bsc#1241274).\n  * CVE-2025-30691: unauthorized access to data via the Compiler component (bsc#1241275).\n  * CVE-2025-30698: unauthorized access to data and ability to cause a partial DoS via the 2D component (bsc#1241276).\n\n- IBM Security Update May 2025\n\n  * CVE-2025-4447: stack based buffer overflow in Eclipse OpenJ9 through modification of file that is read when the JVM\n    starts (bsc#1243429).\n\nOther changes and issues fixed:\n\n- Security:\n\n  * Avoid memory leak during aes cipher initialization operations\n    for IBMJCEPlus and IBMJCEPlusProviders provider.\n  * Changing the default of the com.ibm.security.spnego.msinterop\n    property from true to false.\n  * Deserializing a com.ibm.crypto.provider.rsaprivatecrtkey object\n    causes a java.io.invalidobjectexception to be thrown.\n  * Failed to read private key from a JKS keystore, specified as\n    JCEKS keystore.\n  * HTTPS channel binding support.\n  * Keytool listing PKCS12 keystore issue.\n  * On Linux systems, use gcc11.2 to compile IBM PKCS11 library.\n  * Support has been added to the IBM Java XMLDSigRI security provider\n    for the EdDSA (Edwards-curve Digital Signature Algorithm).\n  * Updates to XDH Key Agreement, AESGCM Algorithms in IBMJCEPlus\n    and IBMJCEPlusFIPS providers.\n\n- Class Libraries:\n\n  * Update timezone information to the latest tzdata2025a.\n\n- Java Virtual Machine:\n\n  * A SIGSEGV/GPF event received while processing verifyerror.\n  * Crash while resolving MethodHandleNatives.\n  * NoSuchMethodException or NoClassDefFoundError when loading classes.\n\n- JIT Compiler:\n\n  * Assert in the JIT Compiler, badILOp.\n  * Reduced MD5 performance.\n","id":"SUSE-SU-2025:01770-1","modified":"2025-05-30T10:09:24Z","published":"2025-05-30T10:09:24Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501770-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1242208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243429"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21587"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-30691"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-30698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-4447"}],"related":["CVE-2025-21587","CVE-2025-30691","CVE-2025-30698","CVE-2025-4447"],"summary":"Security update for java-1_8_0-ibm","upstream":["CVE-2025-21587","CVE-2025-30691","CVE-2025-30698","CVE-2025-4447"]}