java-17-openjdk-17.0.19.0.10-1.el8
エラータID: AXSA:2026-552:05
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and
the OpenJDK 17 Java Software Development Kit.
Security Fix(es):
JDK: Enhance crypto algorithm support (CVE-2026-22007)
JDK: Improve Kerberos credentialing (CVE-2026-22013)
JDK: Enhance Path Factories Redux (CVE-2026-22016)
JDK: Enhance Zip file reading (CVE-2026-22018)
JDK: Enhance certificate chain validation (CVE-2026-22021)
JDK: Updating FreeType 2.14.1 (CVE-2026-23865)
JDK: Enhance TLS connection handling (CVE-2026-34282)
JDK: Enhance key generation (CVE-2026-34268)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE(s):
CVE-2026-22007
CVE-2026-22013
CVE-2026-22016
CVE-2026-22018
CVE-2026-22021
CVE-2026-23865
CVE-2026-34268
CVE-2026-34282
Update packages.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
N/A
SRPMS
- java-17-openjdk-17.0.19.0.10-1.el8.src.rpm
MD5: 4af0709484e5f0ba834ddb5577c01548
SHA-256: 7e753009f3075d0c942f0e705f84c9dd6d0566398331c864ff1c39ca3890f21b
Size: 64.30 MB
Asianux Server 8 for x86_64
- java-17-openjdk-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 1cf4c3ce9cb9894f7e184a2781008a93
SHA-256: 3bf5a45f4122a128f622c4a1173c18817717f2409e2abb8f454259b18227c891
Size: 503.12 kB - java-17-openjdk-demo-17.0.19.0.10-1.el8.x86_64.rpm
MD5: eaafdc9b948ca2bdd99e5a9bca9bf206
SHA-256: da52655226682be77eab77fafad27e8b6a2f189f103a64712e6c7f605950bc65
Size: 3.47 MB - java-17-openjdk-demo-fastdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 9812acd6a51b54282420227dce7964b0
SHA-256: 72bc80f34c339aa4d86cef263ef5c843598e268393a2e561100a6a1a550c2206
Size: 3.47 MB - java-17-openjdk-demo-slowdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: a9d28e64ac213278450b51c2a94309b9
SHA-256: bbee8acb235f7ae5ef3c1d5f98fa6005e0b59da2cf6382ad692ac7ec2607acc0
Size: 3.47 MB - java-17-openjdk-devel-17.0.19.0.10-1.el8.x86_64.rpm
MD5: bb1bf232934eabfd5fcfdc6cc62e26be
SHA-256: d619264d00f80ef0bfeeabf295c673b0b8e8740b24833d8f0c11e1bebf7a0a3d
Size: 5.12 MB - java-17-openjdk-devel-fastdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: e1cffa7c60dedafeb4aee03fd8d5df7b
SHA-256: d07c9d05900a2856b41497f39eb58a7b4a6d79d5c41b323cb0fbe739d1a1a454
Size: 5.12 MB - java-17-openjdk-devel-slowdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: ef3e32c19b12aa5954d2e2dfa5d69615
SHA-256: 7403db6dd403a326ae1d800a42776943f108d28e611bd4a5e0ce0caf2d10fd87
Size: 5.13 MB - java-17-openjdk-fastdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: ca1330fa8c092a7380e485c4df390c56
SHA-256: 27191b8d226eebf978f0e9ad58e23426cb7f32a51185b9a95a12d4001f09b9d4
Size: 512.19 kB - java-17-openjdk-headless-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 1dc0b0d756bc8738a53151afc320f1e1
SHA-256: e71f7752ce24ac681ed26a5e61492ccdf2d786ae31f12cfb4ab6c95f75ac0c39
Size: 46.50 MB - java-17-openjdk-headless-fastdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 1693f3c0d927076ef0e1fb5fcfd13579
SHA-256: 36f4917c90ceccde784fad1a6da5e1cd524b0663dbe9ce17a144d196221efee3
Size: 51.02 MB - java-17-openjdk-headless-slowdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: b3aa3e2823429aed2c3ed8602822f5a0
SHA-256: 090c1ad7f860fd9e79247b568f2dffe2d01aa05cc85af5c752829c2ad2dd1bac
Size: 49.59 MB - java-17-openjdk-javadoc-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 177a2be5e2900fa321d797fe5e42e60d
SHA-256: 8589bbc4bb44040861339251f27a61cb2e187a5e1ea736deeed631856a13df53
Size: 16.07 MB - java-17-openjdk-javadoc-zip-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 7df8c158f92ec75dbaaaeeddd535e098
SHA-256: 685763f1f5fdac887ef3fbe969834a9b2a631a2e666518f882d5c12f6770f953
Size: 40.39 MB - java-17-openjdk-jmods-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 37342b830d5a6196f450fb0c16480057
SHA-256: 28f4076fae7bc3c197a0c3b4077aee4961991b50abd9250190856aa6e1da7487
Size: 257.61 MB - java-17-openjdk-jmods-fastdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: a25236fac5456019b85dc0d3c7236819
SHA-256: e99bd3b4950b11d20340c35ec9c6cc410921a33070c9395aaa2150818f55ad54
Size: 250.43 MB - java-17-openjdk-jmods-slowdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 7f1e2dedac6d2f7e9d85ba40931e9420
SHA-256: a68459481345bca53be81dc8d7ad9cf152922333fa2f97cbe9a43dd48ecf3133
Size: 189.39 MB - java-17-openjdk-slowdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 51bb233f144b0c8d8cedabb66be7b3d3
SHA-256: 14a82a90fed56518faa5115f792b545dc9df588cc62f7bbf88d5384148ed8960
Size: 488.42 kB - java-17-openjdk-src-17.0.19.0.10-1.el8.x86_64.rpm
MD5: dfd6f768ccdb5e785fae15ec97c991bd
SHA-256: a85ca6a854f483aab4900242366400abec98a40c52f686510a63d334be25fa89
Size: 45.59 MB - java-17-openjdk-src-fastdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 7c0574cb90c436ca290f344312ed99d8
SHA-256: 111170da5d3fba0ba32752e5678a54039c44c43cc6a794a57da647b768616762
Size: 45.59 MB - java-17-openjdk-src-slowdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: f17722a4e8a26791879706d7d4289b97
SHA-256: 79d3badcc885899a3f0ff0f9143daab307b0424e4f36c91ba151eeeda3e5ee0f
Size: 45.59 MB - java-17-openjdk-static-libs-17.0.19.0.10-1.el8.x86_64.rpm
MD5: d5673ed5f10aa98d8057e592e7dd3fd7
SHA-256: f847cd55500515166f23b8ebf49a42d02a0e74b31c2ef407fa92031343c48694
Size: 34.21 MB - java-17-openjdk-static-libs-fastdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 82cc82eda84651bacd1a2f47f7cbf289
SHA-256: e346e00af9d7dd23b433af14d7c75c3b146fdd89fa5f3faacfbb2432837c68b1
Size: 34.35 MB - java-17-openjdk-static-libs-slowdebug-17.0.19.0.10-1.el8.x86_64.rpm
MD5: 82d49e7abea181bfb4b30416bcdd73aa
SHA-256: ef6b6dae0d64868483e9d95d562aef05e0ab3968cf4ae6c72575d02c3f1d8fb1
Size: 27.68 MB