java-17-openjdk-17.0.17.0.10-1.el8
エラータID: AXSA:2025-11017:16
リリース日:
2025/11/04 Tuesday - 19:09
題名:
java-17-openjdk-17.0.17.0.10-1.el8
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Java の Security コンポーネントには、リモートの攻撃者により、
複数のプロトコルによる不正なネットワークアクセスを介して、不正な
データの作成、削除および変更を可能とする脆弱性が存在します。
(CVE-2025-53057)
- Java の JAXP コンポーネントには、リモートの攻撃者により、複数
のプロトコルによる不正なネットワークアクセスを介して、機密情報の
漏洩を可能とする脆弱性が存在します。(CVE-2025-53066)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-53057
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
CVE-2025-53066
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
追加情報:
N/A
ダウンロード:
SRPMS
- java-17-openjdk-17.0.17.0.10-1.el8.src.rpm
MD5: d3a87fb60ef508eb72a6ad6a537977fb
SHA-256: ec71b6479724c604e81c1b039adbd1f91d7053200e3118af50c6c053d09c7fd8
Size: 64.00 MB
Asianux Server 8 for x86_64
- java-17-openjdk-17.0.17.0.10-1.el8.x86_64.rpm
MD5: acb28692e4f408aca7df65aa9ea31ff6
SHA-256: 4e1556a0d48de7cce53623491232898dfa07e7bd439433fffbc77eab33a24936
Size: 499.12 kB - java-17-openjdk-demo-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 1bc9e1d0fdc6a899ceaab410a636cb53
SHA-256: 9aca9f2877dfe7588fff9465873ab9ab3b49e1b4211d08e48b311036db66dca3
Size: 3.44 MB - java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 9389a2ec97bc726b60d2476d6b8a1a6e
SHA-256: 8fd8b0cafac1d8be6038bab588a90fe441ada12b71964033794f991dcbb5f162
Size: 3.45 MB - java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 0adb6133b93a4fbcb8936c5fdef197aa
SHA-256: f49e5f46ebb47e3b52361b03a3791ad44816736de7ecaa14ebaf005e2a682c4c
Size: 3.45 MB - java-17-openjdk-devel-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 07c9d13afe8c3ac80a05f34722a66c97
SHA-256: 17df07b2f0407e64a723e703969d3be9b3edec8d1572643628080dd4f63c8d30
Size: 5.12 MB - java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 99ed7bb233dde9437ba4a3dd8b1d07dd
SHA-256: 12e7d0e021dd311eb2211cd05b087edd0874295a699e616a86e9407e4dbe7683
Size: 5.12 MB - java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: f3977252e999df7627a3d81fb5b65ac3
SHA-256: 2f5a371a45cd69ed1f4811b05e491bb502156928e2e531a693db79ae95d468e9
Size: 5.12 MB - java-17-openjdk-fastdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 7cf2d098eeda66daa4b9b4dbebb7bd73
SHA-256: 409d4fc8ad357c48f88ed0cf5cbad0efec37593fe4322546bf765a9d8147abc6
Size: 508.52 kB - java-17-openjdk-headless-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 83c3f8ecb956ea3d22574da50096c743
SHA-256: 7ee670d20f7a33542d8d2b01398bf0a1d7b5e809e023324e38e24d897d6bf34d
Size: 46.27 MB - java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 039ed289150c96200aa26ae971913e46
SHA-256: c3b2b96216b4748e404aaf669ec774a3d3a5e4caadca6795028e8c17a968c231
Size: 50.79 MB - java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: ee8ddff4b96ac14f4517408faa1787ad
SHA-256: dc2f60c28da78f9ffd1321a25478987d4cf850cc88f7b219952a9ca7ee2ed01b
Size: 49.35 MB - java-17-openjdk-javadoc-17.0.17.0.10-1.el8.x86_64.rpm
MD5: f4ff1970aa720405f1fabe3604be9f3f
SHA-256: 571d08a63e1c10262638905a6f3c3542a34e8895d2bebcaac94f5ebff2e7a986
Size: 16.05 MB - java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 45e8e22cf607e5ead813553846e0e4ce
SHA-256: 9cd09343625c0551f4f510c63aa5a8c08e4a46bc8724f35e65aaa1b5b6a0b03d
Size: 40.34 MB - java-17-openjdk-jmods-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 4308db1c3da2aeda73b36c608481c2ef
SHA-256: 27e6b62449502785cc5771151910e280a0a1a74b41d961b47418fb2ac9ead8a4
Size: 256.63 MB - java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: d3d2ba4a8fff0f4c3c697f7dcf769716
SHA-256: d86785bf3c9a47d1c9884bb8c4d6e9f314749285efc3e31974c865b706fb3e5e
Size: 249.46 MB - java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: f8ba0e783de9aa3b9a2d3d96f1bec64c
SHA-256: 2824cb3d694b0c6c5c25cba6f75b425ab15a573358047c042b5752463d9247da
Size: 188.47 MB - java-17-openjdk-slowdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: e508d07654113fc3c8b9fe6e5324114a
SHA-256: a83b04a8a1887e7875b99aefffc9fb932759316c28e3924df1466fa33ecae3c5
Size: 485.19 kB - java-17-openjdk-src-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 80873988437a96fd2a4fe18186146a76
SHA-256: 5e7b8a56fe42cbc167f862bbad94c39b46697bffce0031ecc14a30891168b919
Size: 45.53 MB - java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 8a69d827d93e9a929063d711a15ff9c2
SHA-256: 85509233f4156de7f92f7a2baf087df3aa1e89d0928562d8cc12fcd175d816b5
Size: 45.54 MB - java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: e9689af66207eaf9ee91bbc27d52ea39
SHA-256: 55641518a08b3e2bdae6c10086294c0bed5e1e737c37b34dddc105e92581a64b
Size: 45.54 MB - java-17-openjdk-static-libs-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 9a712af20738f068d496f9e5ecb2078b
SHA-256: 835c3d9a76afe2eab7f2ffe181f41697de73da38663e070cd2c16a6fcb91e75c
Size: 32.84 MB - java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 28e0676a8e54cb9ebac20353cd02d134
SHA-256: 81b8bbd3dcf294029b3dc685528854e37602e14698b4283356bdbdb762491a92
Size: 33.02 MB - java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el8.x86_64.rpm
MD5: 97967e98c889771a5bf553061960684f
SHA-256: 2f67ab680c7fbda35898bce080537c1fde7c70801fd7d573d823b59bf5c0a14f
Size: 26.36 MB