java-25-openjdk-25.0.3.0.9-1.el9.ML.1

エラータID: AXSA:2026-562:06

Release date: 
Friday, May 8, 2026 - 09:26
Subject: 
java-25-openjdk-25.0.3.0.9-1.el9.ML.1
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit.

Security Fix(es):

* JDK: Enhance crypto algorithm support (CVE-2026-22007)
* JDK: Improved Arena allocations (CVE-2026-22008)
* JDK: Improve Kerberos credentialing (CVE-2026-22013)
* JDK: Enhance Path Factories Redux (CVE-2026-22016)
* JDK: Enhance Zip file reading (CVE-2026-22018)
* JDK: Enhance certificate chain validation (CVE-2026-22021)
* JDK: Updating FreeType 2.14.1 (CVE-2026-23865)
* JDK: Enhance TLS connection handling (CVE-2026-34282)
* JDK: Enhance key generation (CVE-2026-34268)

This release also updates a number of third-party libraries included in the JDK. The libraries themselves are affected by the following CVEs, but this is not a statement that the JDK itself is affected:

* giflib: Denial of Service via buffer overflow in EGifGCBToExtension (CVE-2026-26740)
* libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion (CVE-2026-33636)
* libpng: Arbitrary code execution due to use-after-free vulnerability (CVE-2026-33416)

Bug Fix(es):

* When copying files, OpenJDK 25 prefers to use the copy_file_range native function for performance reasons, only falling back to sendfile when this fails. However, in previous OpenJDK 25 releases, a response of EOPNOTSUPP (operation not supported) did not cause the JDK to fall back to sendfile. This is rectified in this release. (RHEL-169939, RHEL-169937)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-22007
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2026-22008
Vulnerability in Oracle Java SE (component: Libraries). The supported version that is affected is Oracle Java SE: 25.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2026-22013
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
CVE-2026-22016
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2026-22018
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2026-22021
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2026-23865
An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.
CVE-2026-26740
Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to cause a denial of service via the EGifGCBToExtension overwriting an existing Graphic Control Extension block without validating its allocated size.
CVE-2026-33416
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng 1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS` sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr` pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes the issue.
CVE-2026-33636
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue.
CVE-2026-34268
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 2.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2026-34282
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-25-openjdk-25.0.3.0.9-1.el9.ML.1.src.rpm
    MD5: e6b03ec1a7b16cc0e04da79463908147
    SHA-256: f1460c08102b42920b3217f9a290afcd48db2a4e9ae5b3d9d48c20955721ddd1
    Size: 73.85 MB

Asianux Server 9 for x86_64
  1. java-25-openjdk-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 48c8a5aad9776f3ce7a3500f70434bbf
    SHA-256: 2d12fc38633c26ba407484e65436e2d30da6331d16e34a31f8170486976b9b63
    Size: 385.95 kB
  2. java-25-openjdk-crypto-adapter-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: bc66d242a58d84da23bca50bb9b1be21
    SHA-256: a6f21355e0ce53ab4d3c2a83e98848568a71d476851083f7f1f60ae44ba5a712
    Size: 46.86 kB
  3. java-25-openjdk-crypto-adapter-fastdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: ea73c1a80bff4a2efe6150ccbab8056f
    SHA-256: 6f85052c745246e98d5afe2c4e6398a489421539fd8fce746411420d59ad7d18
    Size: 46.96 kB
  4. java-25-openjdk-crypto-adapter-slowdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 7533de28c1701b1fc71662262afcfb29
    SHA-256: c4208b1b94f9665e7eed6b957fb65d837704c668a2ffdd312cdc1e162c84b4ff
    Size: 47.67 kB
  5. java-25-openjdk-demo-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: c3aafa6493e6b8718ab7f4406495aac1
    SHA-256: 1881ae140ffe245c6f0f637e79d163e269e7aad69a1f6a4473649096edfc31b3
    Size: 3.16 MB
  6. java-25-openjdk-demo-fastdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 2a2239c763aed0ad9b90e081ec7afb1c
    SHA-256: c60bbe2f41348df20c3e3689b0bde7bd4f16d18e5de1348a31532d9c44092972
    Size: 3.16 MB
  7. java-25-openjdk-demo-slowdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 71f42f5bedfab1f5bf3708246b9df610
    SHA-256: 13a77b49c3ae2454802ff5254063acdae512ab8666cb8bdc903b1559e9b06692
    Size: 3.16 MB
  8. java-25-openjdk-devel-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: c2097c05e57f87e632eabcf055d83ccd
    SHA-256: dabc3f83896144cb2e9cafcad4a808e9a4c153d399e794b30e385ba024e23da3
    Size: 6.04 MB
  9. java-25-openjdk-devel-fastdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 45ad4631515708fcf57ae3a9cb106d27
    SHA-256: b256682e195723fe5ff0d4b77a81e2ecfda366e302c73b59350505af7592e024
    Size: 6.04 MB
  10. java-25-openjdk-devel-slowdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 26046190d287bf524aa29f2b8a3a5dc7
    SHA-256: f6b9c69d3754dfc1de317d6e63e4691286c8ca5f523e89b5577cf4db69c41698
    Size: 6.05 MB
  11. java-25-openjdk-fastdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 9c880052be4b19792ccb7a8bc21b6212
    SHA-256: d3f70cc5dcc29042d57e807c119560fc6429026a60746ec2f9c4ee03caecee44
    Size: 394.48 kB
  12. java-25-openjdk-headless-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 5d60e43bcb51fe8101d1928ed0d85c97
    SHA-256: 2d425358bc717d9c14e085fb73b468127d62ae4e548359c5d44400a03bd41821
    Size: 59.15 MB
  13. java-25-openjdk-headless-fastdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: f480b0f8eb9acbe81131b6742d47a51a
    SHA-256: f54e6b37c71e4fd841f456baa2b4417ce531aaceb33b7e9d750686a3bb085c54
    Size: 64.35 MB
  14. java-25-openjdk-headless-slowdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 9a30f93016d98895f0854e7e6e1ef650
    SHA-256: e6245764931bd3703d9ce90d9ba690d3e43edca880e4a402a582e3c1be66f230
    Size: 62.27 MB
  15. java-25-openjdk-javadoc-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: e6ed746fc993716ceca88d13a271c970
    SHA-256: e4a918e0debd53519df10ec1aa9563e37f428d6d9b4a0925841ad3a412ef578e
    Size: 19.85 MB
  16. java-25-openjdk-javadoc-zip-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 8253e6b85a47e4871ab037151b9598df
    SHA-256: c92f15b24a553de42927b0db97a504f5212a3694e69c81e49be8aa254c0d052d
    Size: 47.90 MB
  17. java-25-openjdk-jmods-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: e75c9f2dd6dd89c17e22563a67d3e5b0
    SHA-256: 4801a7d0b491b21b916d6d286ac0bf52b00c4b58afe64f5f5075ca0fe28f6023
    Size: 345.76 MB
  18. java-25-openjdk-jmods-fastdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: f7ddfdc32afefc9bac260bacf24907cc
    SHA-256: 7e04cb275f00d6670cb670dc936145994ca05eaf6f031015fe1147b4da3b4df0
    Size: 408.08 MB
  19. java-25-openjdk-jmods-slowdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 1abb18cefb9dc1dba29c79bd3029eefc
    SHA-256: b7fe7d9514300423c6b68958a25e207f62559a581cb0ffdd00c151f2e1834201
    Size: 309.24 MB
  20. java-25-openjdk-slowdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 4e82bd298be627af966464d82c62a242
    SHA-256: 7eb6455d64859434d2c1a645603f56e46219652d156e4af096b4a39dc8f9ab75
    Size: 396.31 kB
  21. java-25-openjdk-src-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: d662bf9110fa28b09e13005417382b40
    SHA-256: 6608b811f0679110c121d311e2480d1664c709d80b3b4b29131748e3a05516a9
    Size: 46.21 MB
  22. java-25-openjdk-src-fastdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 6c002599bddb6c5c3335acf9d96243e8
    SHA-256: 707c0c42f3dc73dc8abe7c719a14bcb2db900982a95d3edda07f669f06001a91
    Size: 46.21 MB
  23. java-25-openjdk-src-slowdebug-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 0465d0dfab920b062ae2b8a70c7c2afd
    SHA-256: 73a1479aa263b81047d2728d449f770f4753525ffafc1eefd01d4fa2dde8869a
    Size: 46.21 MB
  24. java-25-openjdk-static-libs-25.0.3.0.9-1.el9.ML.1.x86_64.rpm
    MD5: 33695369ccf6e26163352f9503d9b65b
    SHA-256: 783b15911f2183edce04049973fcb0d7163ac4b21adddd24d9724a495288edec
    Size: 32.16 MB