java-17-openjdk-17.0.2.0.8-4.el8
エラータID: AXSA:2022-2986:01
以下項目について対処しました。
[Security Fix]
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition がアクセス可能な特定の
データに対し、認証されていない update や insert、delete アクセスが出来る
脆弱性があります。(CVE-2022-21248)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21277)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition がアクセス可能なデータの
サブセットへ、未認証の読み込みアクセスが可能となる脆弱性があります。
(CVE-2022-21282)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21283)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition がアクセス可能な
データに対し、認証されていない update や insert、delete アクセスが出来る
脆弱性があります。(CVE-2022-21291)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21293)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21294)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition がアクセス可能なデータの
サブセットへ、未認証の読み込みアクセスが可能となる脆弱性があります。
(CVE-2022-21296)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21299)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition がアクセス可能な特定の
データに対し、認証されていない update や insert、delete アクセスが出来る
脆弱性があります。(CVE-2022-21305)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21340)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21341)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21360)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21365)
- Java には、Java SE や Oracle GraalVM Enterprise Edition を危険にさらすために
複数のプロトコルを介してネットワークにアクセスしている認証されていない
攻撃者が、Java SE や Oracle GraalVM Enterprise Edition に部分的なサービス拒否を
引き起こせる、認証されていない権限を取得できる脆弱性があります。
(CVE-2022-21366)
パッケージをアップデートしてください。
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
N/A
SRPMS
- java-17-openjdk-17.0.2.0.8-4.el8.src.rpm
MD5: 54ec47476191781fe9ff8473fb3f0456
SHA-256: fd361b9e5a53cc29dca52564884f1639f9b302df60e2d1616a0e330a82c52916
Size: 61.18 MB
Asianux Server 8 for x86_64
- java-17-openjdk-17.0.2.0.8-4.el8.x86_64.rpm
MD5: 86401a7882a8eab20e2de4f2470a1440
SHA-256: 840b987e694b66724de493097497d9ce34330d63eb245176896db4fc68dc4ab9
Size: 244.28 kB - java-17-openjdk-demo-17.0.2.0.8-4.el8.x86_64.rpm
MD5: 80e4c3a5ee21270a3ba94493cfe006b7
SHA-256: 5a3d21c5b13ab3fd222dcf9b9e9bb934cd9e17049ffcc0392cb11ab94e37df79
Size: 4.29 MB - java-17-openjdk-devel-17.0.2.0.8-4.el8.x86_64.rpm
MD5: a86fd165a8a1d916952e7e5489ff134b
SHA-256: 93c713ef36f3e4afd91b037b8137f644821e7b6b4963a89c9b11a962d4063723
Size: 5.09 MB - java-17-openjdk-headless-17.0.2.0.8-4.el8.x86_64.rpm
MD5: 207c5021041b2a3aedbd0cc1f3ee8e34
SHA-256: 6dd3913a3cd8f6e0eac7998238afeaea3e8d388c54c9d1c0f395eda1fcad44a3
Size: 41.10 MB - java-17-openjdk-javadoc-17.0.2.0.8-4.el8.x86_64.rpm
MD5: 2178afa4d5a91ecda8e7d10cd468c0aa
SHA-256: 7fa6a3c2b6014c07ffcf8166046db8551c87d2142b0017aff6e5f7e9111d1101
Size: 15.98 MB - java-17-openjdk-javadoc-zip-17.0.2.0.8-4.el8.x86_64.rpm
MD5: 849cf0f324268f80fce1b275977e707a
SHA-256: 6e1fa7f6b83721c4c0a9b2b22e136384c7bcfc464d5dc3a1537c15d4eba0c048
Size: 40.36 MB - java-17-openjdk-jmods-17.0.2.0.8-4.el8.x86_64.rpm
MD5: ed265ab364041fb1dcb078f71bc75cda
SHA-256: 2942fadf5eca0c6372021da9c7426d4beca957ce0f9b69f98eb5bc10072d9dde
Size: 238.52 MB - java-17-openjdk-src-17.0.2.0.8-4.el8.x86_64.rpm
MD5: 3f95370599db889facc7b1d08b00774e
SHA-256: 96e429f2651d4f6fd13178b3ca4f65df1c04c40e1bb4844f33a5233bc7d72d47
Size: 45.29 MB - java-17-openjdk-static-libs-17.0.2.0.8-4.el8.x86_64.rpm
MD5: 2136c2d1098bafc3bfc8dfaa6c29e013
SHA-256: 552c63639e20a356a12529f36e3d004f9c804827efca98d52296b320bbf89c23
Size: 26.16 MB