java-17-openjdk-17.0.16.0.8-2.el8
エラータID: AXSA:2025-10574:10
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* JDK: Better Glyph drawing (CVE-2025-30749)
* JDK: Enhance TLS protocol support (CVE-2025-30754)
* JDK: Improve HTTP client header handling (CVE-2025-50059)
* JDK: Better Glyph drawing redux (CVE-2025-50106)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-30749
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE-2025-30754
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2025-50059
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
CVE-2025-50106
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Update packages.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
N/A
SRPMS
- java-17-openjdk-17.0.16.0.8-2.el8.src.rpm
MD5: a0e3322c2e86e869ec6b582282b1d72b
SHA-256: e6a8207c440e4a2d1f50008fe64fec131f5f9198cb894f11639a7e4877ee24b5
Size: 63.92 MB
Asianux Server 8 for x86_64
- java-17-openjdk-17.0.16.0.8-2.el8.x86_64.rpm
MD5: a97150d6a3c3fefc14d31bf845eed5ad
SHA-256: 378babee8fe772cccbe8e066115db4b65ad8923cec4cfd4bcb6508dfbcd265ed
Size: 492.02 kB - java-17-openjdk-demo-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 53086e6f42f61f38b9b3af75be7fdc40
SHA-256: 0b4ddf767f519ea6a15021665607f37ef894f25ae5307366ab2d004c9fc9227a
Size: 3.44 MB - java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: ca0418fc55c2b935dbda2a46145e2862
SHA-256: 7f274d4057a2654a05f47488e1b8492f57860f8ed0e445dc49610b0eefa7ed39
Size: 3.44 MB - java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 5e84025c3ae7d65faa6c3ba83a6e7e15
SHA-256: 654659123a98f6671c11fbe9401639d699f96f9c9ffe739e131d7cfa07612724
Size: 3.44 MB - java-17-openjdk-devel-17.0.16.0.8-2.el8.x86_64.rpm
MD5: b2b62ae304614dfb090ba1abe1afa034
SHA-256: 56e0f8c6860a80d90cfe203252663e7a65123966961b5e1dd69f53bb180b009b
Size: 5.12 MB - java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 1dae91cded1fb5ef3bc4d10832d4e5d6
SHA-256: ed9fb11f51d2ec8647571ecb8167e5fe2a6181810ee3b86f406ebb4de2d3b650
Size: 5.12 MB - java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: b8ad92f9952f92902908613e72e9c0f0
SHA-256: b7ba7522672811772c6b564c31794107f08872926f9e48b2d8fc854e84b57449
Size: 5.12 MB - java-17-openjdk-fastdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 30102e2782b3e6a024f20ebbfcf55a3f
SHA-256: a7f174869ab761f60cc5d103fa7664539269dbba763c1b15655700871a0b6e06
Size: 501.02 kB - java-17-openjdk-headless-17.0.16.0.8-2.el8.x86_64.rpm
MD5: f17edc017f768f70bd6f5064f7b374ca
SHA-256: 9254014cb6d848749394cdc9ac66434bac5eb33a154cb653a5c106c1c9756f90
Size: 46.23 MB - java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: d3c9d03bc61815ec6c43b5e341c3ba39
SHA-256: 40eed696e93bfb7325c9c629c4d857498e7af804668eaca303b16304f84d28ae
Size: 50.74 MB - java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 8d39f95eb0c93a725d4524af85524b33
SHA-256: b2c65917d45f85dcd1c9f1ccb1c51b49bb4070ae761b0e57e3b883d5803b1b3f
Size: 49.31 MB - java-17-openjdk-javadoc-17.0.16.0.8-2.el8.x86_64.rpm
MD5: f55becba9ba08113e77fb24d3fcbab71
SHA-256: d48915425a023787897c149eb3544e1b6ca3e285cc6a3503170bcc8a122b3358
Size: 16.04 MB - java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 094e954d155150714f1222c25fc095e8
SHA-256: 1fced3c73dc32cff68f5b9ef98c690678bbed6ec6101f7275d6bf3293d39f1a0
Size: 40.32 MB - java-17-openjdk-jmods-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 37f53e25387f914a19ce0f5dd6b488d7
SHA-256: 38754f68f27587c7fa48d8a8b9066a67caa8c1e74d91851253a5007fee935792
Size: 256.01 MB - java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: bc6778377bb820764a172ce98b971b27
SHA-256: f41f1f4220a62ff32d1d1caa6a5d8bfc2069ab08f7c3f8bcf77b1394f06bfd53
Size: 248.66 MB - java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: bb8d141924e3403ed21a2dbd3b66a898
SHA-256: eda2874e04ddb5f5177627c1db111385f8dc67d310856c8cba0dfea90f6bf82a
Size: 187.79 MB - java-17-openjdk-slowdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: c3365aec293236a544e308795674c664
SHA-256: b5e77aa41c3252bbfe979ed34c9322ca2143ad55bfff01107228bdaeb1d495a9
Size: 478.78 kB - java-17-openjdk-src-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 411321361ff19c2dc910eb50ed7cc87e
SHA-256: 50c2b066fc965f072832e9ef66ce8bdc2b1fa860252e6e69c9e906d237a2d675
Size: 45.50 MB - java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 22819f37d2aa1ee27bb23517e5974a5c
SHA-256: 2275adc1121052dfd612cdb6ccc58f8ab150bf3b63d9c587cd3883f50cdc4fa4
Size: 45.51 MB - java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: f9554bd44f7be9c1588589891396a66f
SHA-256: 269683027cc547edd1934e522e6e6d4f071a3e6b8e135f2c84606d92b4284cbe
Size: 45.51 MB - java-17-openjdk-static-libs-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 85b7faa69a0100ce0a1b9b8d4fbcb4d3
SHA-256: 6fcd4e0c744f2eb6e1d3ff2a752eab0798916908d6ad6a57ee4af7892a497da4
Size: 31.99 MB - java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: ffe9677bad73e0dd8040828a19470e69
SHA-256: f1c29f03d32cf83461ec6c6aa7263026302359cc2886496badd7ca96b9523112
Size: 32.15 MB - java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el8.x86_64.rpm
MD5: 1d5e14ffda5b005ce06ae22d9d6970da
SHA-256: c490560ce5be79e57f72ef14dfd968454e1d5aa1b328631909888388ffd03165
Size: 25.49 MB