java-1.8.0-openjdk-1.8.0.452.b09-2.el8
エラータID: AXSA:2025-9868:07
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* JDK: Better TLS connection support (CVE-2025-21587)
* JDK: Improve compiler transformations (CVE-2025-30691)
* JDK: Enhance Buffered Image handling (CVE-2025-30698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-21587
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE:8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK:17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition:20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2025-30691
Vulnerability in Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and 24. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data as well as unauthorized read access to a subset of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2025-30698
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
Update packages.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE:8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK:17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition:20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and 24. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data as well as unauthorized read access to a subset of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
N/A
SRPMS
- java-1.8.0-openjdk-1.8.0.452.b09-2.el8.src.rpm
MD5: d219dfe8c07c61da44ccd63c23cc5562
SHA-256: 6678eb981309e65af4b294112af8e191b3c701b32274a73556140f4f8adfe1fa
Size: 58.13 MB
Asianux Server 8 for x86_64
- java-1.8.0-openjdk-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 8f5e617b28bb1db87c52abfa063125d8
SHA-256: 7bd86b3147386da99112d5a5547cde2c152c01aa12963da0ac55d741066121ae
Size: 558.17 kB - java-1.8.0-openjdk-accessibility-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 303e525f147843bfac40e39de30fdd93
SHA-256: 439d236c50af3bcd775b13a183cb1cd36732f7daa2ada4cb6e401e2e28fe3e78
Size: 126.87 kB - java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 49143ae4d3d5d249fc31704e17241a7a
SHA-256: 9435cbcc6cce854c100386ca9f947d7a349da255a1bd6adcd01ef00ae32df5c8
Size: 126.72 kB - java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 9921555d08f6a283ce62e3a4a36711ae
SHA-256: 92d1a47851f2c7805b63fe640fbe5083521ee355a6c4c809e123c7bcacb42acd
Size: 126.72 kB - java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: b35a6b4048f670cba432ce25a62a5c88
SHA-256: 25afbea9471f5215490fcbc0d72b4511c35b38c403175bac82908d55c8579ee1
Size: 2.09 MB - java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: a9f79896d6f6c7e09a73b1d5d855273c
SHA-256: 8af7ac97ede763d6ff68362060acaa87d5c0ab5b4f28783aa60c07fc4dc27e7b
Size: 2.11 MB - java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: aae435525294e1131bb7b840066c0e5f
SHA-256: a029c9bc75b564ee7843ae15fb8b75eb9c3108ca540f8d3cf57b504190eed105
Size: 2.11 MB - java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 396d47d4fea84c70308dabf07ef7d3b7
SHA-256: 6f678a0de5f6de530630247f5f395a138fe7982842f70130833b9ab49d41f6e4
Size: 9.96 MB - java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 2d139738fe748df255e8bf2f065cfde4
SHA-256: 3a2ab0ba1b2e8cea1354e2393fa75a5c11117373fd2d88ca1b6f9f705c5a7c66
Size: 9.96 MB - java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: d5eae6ca65d1409c81779fe690288d92
SHA-256: 7a340afa30890f9d4a00cc1dda3efeed0e4b8059f224a557f75dfb97f53f2596
Size: 9.97 MB - java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: ac99bd6ff9ff29e6f7622368260a7b38
SHA-256: e02bfddbe54da8413c7c057c5b05f8dfad45f3eb4a1da5f77938a33134a72921
Size: 571.52 kB - java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: a9c7b302f6ae27e8b9134bc2efd9f901
SHA-256: 5471049441bdac099b546d8e0744f95b18711b3389f6f46a6b75a1634c5eaf20
Size: 34.54 MB - java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: e4286211ec31aace9f55c412eda614d8
SHA-256: 340b7882444b97758ac891b0581c369a3f9db6d658873525a36bdd7c84f7cde3
Size: 38.18 MB - java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 2bcd9d9842b78c19235a64e42a3baaca
SHA-256: 2c07ace9076265d4523ae970ea860d641ca052abc852c48d08881616d46b49dc
Size: 36.37 MB - java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el8.noarch.rpm
MD5: fc20f2689b6e4884c3b4617044f2409d
SHA-256: ae7f2d469cf7affd7d999d8cec17954c69a5808ea542f0876d3e0e605063095f
Size: 15.20 MB - java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el8.noarch.rpm
MD5: 7ec503acb6d7744005ad0eadb418720d
SHA-256: e81124d472a16a39328141e5fc37c7e02e99ded0d1e79827e03d9ffd91f7734f
Size: 41.65 MB - java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: a9fa87737eadcbb2edd3fcaedb0f7dff
SHA-256: 35349676966884b1c65cea021799cd4d4ac07597efb28390d43f041bd2f98c2c
Size: 547.80 kB - java-1.8.0-openjdk-src-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 20b3710682eafa8d211c40d79f0ab23f
SHA-256: e6ee798b757bbaa3f755f2902aedda201bea762feaa9fd7243d8470b355e9921
Size: 45.53 MB - java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: ce377bd1dfb57809ef4323ab3643f0e1
SHA-256: dd1df73f8475531203fb4b1ff7f82948caf1b1a2a3e33f3eae3b04fb071e6a23
Size: 45.53 MB - java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el8.x86_64.rpm
MD5: 941b5aa2295d9bd173402b96164d3a31
SHA-256: dcc9c4fedd69dc5b1f6525ab98ba2d575159ce816126cf1ba5a107b0b6963baa
Size: 45.53 MB