java-17-openjdk-17.0.15.0.6-2.el9.ML.1
エラータID: AXSA:2025-9865:06
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and
the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
* JDK: Better TLS connection support (CVE-2025-21587)
* JDK: Improve compiler transformations (CVE-2025-30691)
* JDK: Enhance Buffered Image handling (CVE-2025-30698)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE-2025-21587
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM
Enterprise Edition product of Oracle Java SE (component: JSSE). Supported
versions that are affected are Oracle Java SE:8u441, 8u441-perf, 11.0.26,
17.0.14, 21.0.6, 24; Oracle GraalVM for JDK:17.0.14, 21.0.6, 24; Oracle GraalVM
Enterprise Edition:20.3.17 and 21.3.13. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to
compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise
Edition. Successful attacks of this vulnerability can result in unauthorized
creation, deletion or modification access to critical data or all Oracle Java
SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as
well as unauthorized access to critical data or complete access to all Oracle
Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible
data. Note: This vulnerability can be exploited by using APIs in the specified
Component, e.g., through a web service which supplies data to the APIs. This
vulnerability also applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely on the
Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and
Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2025-30691
Vulnerability in Oracle Java SE (component: Compiler). Supported versions that
are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and
24. Difficult to exploit vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Oracle Java SE. Successful
attacks of this vulnerability can result in unauthorized update, insert or
delete access to some of Oracle Java SE accessible data as well as unauthorized
read access to a subset of Oracle Java SE accessible data. Note: This
vulnerability can be exploited by using APIs in the specified Component, e.g.,
through a web service which supplies data to the APIs. This vulnerability also
applies to Java deployments, typically in clients running sandboxed Java Web
Start applications or sandboxed Java applets, that load and run untrusted code
(e.g., code that comes from the internet) and rely on the Java sandbox for
security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS
Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2025-30698
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM
Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions
that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14,
21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM
Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to
compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise
Edition. Successful attacks of this vulnerability can result in unauthorized
update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for
JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized
read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle
GraalVM Enterprise Edition accessible data and unauthorized ability to cause a
partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for
JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start applications
or sandboxed Java applets, that load and run untrusted code (e.g., code that
comes from the internet) and rely on the Java sandbox for security. This
vulnerability does not apply to Java deployments, typically in servers, that
load and run only trusted code (e.g., code installed by an administrator). CVSS
3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS
Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
Update packages.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE:8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK:17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition:20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Vulnerability in Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and 24. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data as well as unauthorized read access to a subset of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
N/A
SRPMS
- java-17-openjdk-17.0.15.0.6-2.el9.ML.1.src.rpm
MD5: 96fe79f53f50186f62cc6fc710d608fa
SHA-256: 50423bc75804be806073f29b0df33520a677009646d656092823f0ca2683660a
Size: 63.67 MB
Asianux Server 9 for x86_64
- java-17-openjdk-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 0af19acc7dbba2b89972eb8551fa83a1
SHA-256: 61babddae094491f805bc34acc4f6f93ac314fe60506b1259f82922a7b4f8b6c
Size: 430.33 kB - java-17-openjdk-demo-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 9aac6c9412e8718907c2703c7788b85b
SHA-256: ef2e96ef9b167b3c31d162cbe0b282f1f92c1762fa3e11dc44e646d17bf507bb
Size: 3.41 MB - java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 65d32d68c5f2347bfdea2cb21fcd0d54
SHA-256: b14297297cd4b379f6a7d44d9771aef08f2b6f4667a1da7e33b0093f761fcff8
Size: 3.42 MB - java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 5a0d9eb07ec2bab0e963290cf80b9faf
SHA-256: 6d346c0ea699412d7d6436b68e37f869bb7359d80090cf36981a696c50d01837
Size: 3.42 MB - java-17-openjdk-devel-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: b77aec7e3096bca13a819140ee661709
SHA-256: bcfe44fd3cdc18e89a204717e5e3ef6353d2f4c6176c68254b01ddfdca6dd74c
Size: 4.72 MB - java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 006fa6914e2ed49c09301ff39435db8f
SHA-256: 31e8e7acac86677a72166490d621bfd4a53164783973e0175cd2d1d49dd20240
Size: 4.72 MB - java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 361fb0195df1bceaea969867eeb46f93
SHA-256: 2298e9ed648d20131d9a7ec8f985dbedbd1260f6ecb68fa86251b88b9b27b8fa
Size: 4.72 MB - java-17-openjdk-fastdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 607494ba42329d6220c1768b7d6d6648
SHA-256: 8ffa9b2151a08dce302241a58d30abc5771623e77202da68e2a8a8bc5bbab89b
Size: 438.24 kB - java-17-openjdk-headless-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: afe942c0cac43a026d7629c91c0031b5
SHA-256: bf1436ceade7ccdd758097d5f72b80461e58e4cdce1210979525bae19c59b322
Size: 44.03 MB - java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 9739e01630bcc50c167fa4d32bc3994a
SHA-256: 941110aa38bd778af567000e359de24fc3383ecba43abdf3c04f3b42b29c4803
Size: 49.02 MB - java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 556ac548ecec872ef85db93610416962
SHA-256: 79a6e74de90eb1ae7aec312e41fb79503b17c3dd623622877b99fbb396aae873
Size: 45.82 MB - java-17-openjdk-javadoc-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 50f0d5ab635be575e0a053d875cc6c0d
SHA-256: 0fa78cc9643f8f2c4701938ddae8b47ee6e1a2121e9273815ae2330ae905ff35
Size: 14.68 MB - java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: d8a89055e8226afdf6377bdb81e4df38
SHA-256: 55fb14cc794cf8622e123a19ecce25c3c01c4499c3aa384f5bcfb0d5a105b019
Size: 39.44 MB - java-17-openjdk-jmods-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: d8e2e87d8e9857d6f758dba4a5c54b05
SHA-256: 87f963dbf64596682c99d118b8593b22f6b61ff1f4f0088f46cfaf772203e5ee
Size: 243.81 MB - java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: d091175ccc4bcf545bc28f93b4f8ddb0
SHA-256: 00cc90989c64a65f6c7f0b07a7ff6894179d5b694572b3d856b90a42598b09bc
Size: 242.14 MB - java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: b4a99c3aad2c3566694ef8033a3b45ac
SHA-256: 1213d39319454b75a2375ee5d2b34d8c00193d860ebb346c01348734376a5ada
Size: 172.38 MB - java-17-openjdk-slowdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 0a7d937a89af0ab4d5b8b4fab56fbe30
SHA-256: 14085d5d35b082c61820da2f9aaac357190c05e587ed2a3e73740fe37e07067f
Size: 410.00 kB - java-17-openjdk-src-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: b6ae59c602ed840986a035feb04f749c
SHA-256: 634429bfdf492f6c787a1a349d745f2b1df4f9d6ae975aa9d369707603ef07e4
Size: 44.84 MB - java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 3a535daaa6a8655d36c585f942c3f0de
SHA-256: ebbfb8eba320bf9560d8143046a0a73cbf5a9165565abbb1e76aff7fdeb7d4db
Size: 44.85 MB - java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 56c240b5a7d38276e5300d645177d956
SHA-256: 658eeb2823ec6e31fcd43bb5c4ab5bc9b6e5a2624434c22759ef2a029608fc29
Size: 44.85 MB - java-17-openjdk-static-libs-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: de9993e25a89de3d3f117964d2c48cf9
SHA-256: 88bcb8698fbcf467310b39a7005f94772a593143226476aee7d045e4a2a0eb4d
Size: 26.33 MB - java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: c7ca281203bb5f529dac025769335922
SHA-256: 8e6dfad5bfb4eb581ca7488e33227f26c496629fbe49119cdbe61913e1d0ced5
Size: 26.48 MB - java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9.ML.1.x86_64.rpm
MD5: 4b05ecc1ce06b042125bcf217651d1b7
SHA-256: cb1f1ba6abc7977e8dee7cb21ea1917a310593f02b2318ed6bd9d922eda2a740
Size: 20.14 MB