java-1.8.0-openjdk-1.8.0.242.b07-1.AXS4

エラータID: AXSA:2020-4437:02

Release date: 
Tuesday, February 11, 2020 - 21:47
Subject: 
java-1.8.0-openjdk-1.8.0.242.b07-1.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment
and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951)
(CVE-2020-2601)

* OpenJDK: Serialization filter changes via jdk.serialFilter property
modification (Serialization, 8231422) (CVE-2020-2604)

* OpenJDK: Improper checks of SASL message properties in GssKrb5Base
(Security, 8226352) (CVE-2020-2590)

* OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues
(Networking, 8228548) (CVE-2020-2593)

* OpenJDK: Excessive memory usage in OID processing in X.509 certificate
parsing (Libraries, 8234037) (CVE-2020-2654)

* OpenJDK: Incorrect exception processing during deserialization in
BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)

* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in
DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

CVE-2020-2583
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Serialization). Supported versions that are affected are Java SE:
7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks of this
vulnerability can result in unauthorized ability to cause a partial denial of
service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability
applies to Java deployments, typically in clients running sandboxed Java Web
Start applications or sandboxed Java applets (in Java SE 8), that load and run
untrusted code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability can also be exploited by using APIs in
the specified Component, e.g., through a web service which supplies data to the
APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-2590
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Security). Supported versions that are affected are Java SE: 7u241,
8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via Kerberos
to compromise Java SE, Java SE Embedded. Successful attacks of this
vulnerability can result in unauthorized update, insert or delete access to some
of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies
to Java deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets (in Java SE 8), that load and run
untrusted code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability can also be exploited by using APIs in
the specified Component, e.g., through a web service which supplies data to the
APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2020-2593
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Networking). Supported versions that are affected are Java SE:
7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks of this
vulnerability can result in unauthorized update, insert or delete access to some
of Java SE, Java SE Embedded accessible data as well as unauthorized read access
to a subset of Java SE, Java SE Embedded accessible data. Note: This
vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8),
that load and run untrusted code (e.g., code that comes from the internet) and
rely on the Java sandbox for security. This vulnerability can also be exploited
by using APIs in the specified Component, e.g., through a web service which
supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and
Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2020-2601
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Security). Supported versions that are affected are Java SE: 7u241,
8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via Kerberos
to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE,
Java SE Embedded, attacks may significantly impact additional products.
Successful attacks of this vulnerability can result in unauthorized access to
critical data or complete access to all Java SE, Java SE Embedded accessible
data. Note: This vulnerability applies to Java deployments, typically in clients
running sandboxed Java Web Start applications or sandboxed Java applets (in Java
SE 8), that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. This vulnerability can also
be exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. CVSS 3.0 Base Score 6.8
(Confidentiality impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
CVE-2020-2604
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM
(component: Java). The supported version that is affected is 19.3.0.2. Difficult
to exploit vulnerability allows unauthenticated attacker with network access via
multiple protocols to compromise Oracle GraalVM Enterprise Edition. Successful
attacks of this vulnerability can result in takeover of Oracle GraalVM
Enterprise Edition. Note: GraalVM Enterprise 19.3 and above includes both Java
SE 8 and Java SE 11. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and
Availability impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
CVE-2020-2654
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries).
Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and
13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE. Successful attacks
of this vulnerability can result in unauthorized ability to cause a partial
denial of service (partial DOS) of Java SE. Note: This vulnerability can only be
exploited by supplying data to APIs in the specified Component without using
Untrusted Java Web Start applications or Untrusted Java applets, such as through
a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-2659
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Networking). Supported versions that are affected are Java SE: 7u241
and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability
can result in unauthorized ability to cause a partial denial of service (partial
DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start applications
or sandboxed Java applets (in Java SE 8), that load and run untrusted code
(e.g., code that comes from the internet) and rely on the Java sandbox for
security. This vulnerability can also be exploited by using APIs in the
specified Component, e.g., through a web service which supplies data to the
APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector:
(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-1.8.0-openjdk-1.8.0.242.b07-1.AXS4.src.rpm
    MD5: 997e55f73d30870b6fed20855bce28dc
    SHA-256: 50cd5246a3d91b2d8acb0f4a52ad49cc541d874f34c3a544c7c1fd21c26ecba8
    Size: 54.01 MB

Asianux Server 4 for x86
  1. java-1.8.0-openjdk-1.8.0.242.b07-1.AXS4.i686.rpm
    MD5: fad71c8e7c0f7a338b9812713114e7f2
    SHA-256: f879c163c3ba76c76c86eaa7b62deab07abdec15cea37bd3d987bc9e138d30cb
    Size: 220.15 kB
  2. java-1.8.0-openjdk-devel-1.8.0.242.b07-1.AXS4.i686.rpm
    MD5: 78247d77d7ee82f396bf39feaedfb57f
    SHA-256: 0c7e6d9eba4135c67110ea3756774f1a9faf7654fc2e6512210cc423c8607c02
    Size: 10.10 MB
  3. java-1.8.0-openjdk-headless-1.8.0.242.b07-1.AXS4.i686.rpm
    MD5: 4aee84f500e0c6bc565e6a797f0d22a7
    SHA-256: b60ea87e91c93ca6d98a339fe0ded1cdea76d8af75b5f8cef6a56b6206e30181
    Size: 31.65 MB

Asianux Server 4 for x86_64
  1. java-1.8.0-openjdk-1.8.0.242.b07-1.AXS4.x86_64.rpm
    MD5: 2d4695d87b6bfbd466476df81dcf276f
    SHA-256: 1f29c4ea11d5098b8fe6c4cae3a753f7e42ce362f1d1816c5d4c9e993ee1ebd7
    Size: 233.08 kB
  2. java-1.8.0-openjdk-devel-1.8.0.242.b07-1.AXS4.x86_64.rpm
    MD5: cbc2e1388cabebb77a7bf03986d37d35
    SHA-256: 35ab6e8c93dca45d3380eed19a2fe6b43d298fce1d10949b6c5dd8d03a10f39e
    Size: 10.10 MB
  3. java-1.8.0-openjdk-headless-1.8.0.242.b07-1.AXS4.x86_64.rpm
    MD5: aacdbae0662a435e804ee50ecd08b97a
    SHA-256: d223ac9df5c6551a1ae7b7ae4d6a4a71aa9e29b1704cb622a5721fddc0f5b33c
    Size: 32.27 MB