java-1.8.0-openjdk-1.8.0.262.b10-0.0.1.AXS4

エラータID: AXSA:2020-224:13

Release date: 
Friday, July 17, 2020 - 08:46
Subject: 
java-1.8.0-openjdk-1.8.0.262.b10-0.0.1.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment
and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access
(Libraries, 8238920) (CVE-2020-14583)

* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119)
(CVE-2020-14593)

* OpenJDK: Incorrect handling of access control context in ForkJoinPool
(Libraries, 8237117) (CVE-2020-14556)

* OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731)
(CVE-2020-14578)

* OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries,
8237736) (CVE-2020-14579)

* OpenJDK: XML validation manipulation due to incomplete application of the
use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621)

* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in
normalized form (JSSE, 8237592) (CVE-2020-14577)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

CVE-2020-14556
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Libraries). Supported versions that are affected are Java SE: 8u251,
11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability
allows unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability
can result in unauthorized update, insert or delete access to some of Java SE,
Java SE Embedded accessible data as well as unauthorized read access to a subset
of Java SE, Java SE Embedded accessible data. Note: Applies to client and server
deployment of Java. This vulnerability can be exploited through sandboxed Java
Web Start applications and sandboxed Java applets. It can also be exploited by
supplying data to APIs in the specified Component without using sandboxed Java
Web Start applications or sandboxed Java applets, such as through a web service.
CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
CVE-2020-14577
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: JSSE). Supported versions that are affected are Java SE: 7u261,
8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via TLS to
compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability
can result in unauthorized read access to a subset of Java SE, Java SE Embedded
accessible data. Note: Applies to client and server deployment of Java. This
vulnerability can be exploited through sandboxed Java Web Start applications and
sandboxed Java applets. It can also be exploited by supplying data to APIs in
the specified Component without using sandboxed Java Web Start applications or
sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7
(Confidentiality impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2020-14578
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Libraries). Supported versions that are affected are Java SE: 7u261
and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability
can result in unauthorized ability to cause a partial denial of service (partial
DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment
of Java. This vulnerability can be exploited through sandboxed Java Web Start
applications and sandboxed Java applets. It can also be exploited by supplying
data to APIs in the specified Component without using sandboxed Java Web Start
applications or sandboxed Java applets, such as through a web service. CVSS 3.1
Base Score 3.7 (Availability impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-14579
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Libraries). Supported versions that are affected are Java SE: 7u261
and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability
can result in unauthorized ability to cause a partial denial of service (partial
DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment
of Java. This vulnerability can be exploited through sandboxed Java Web Start
applications and sandboxed Java applets. It can also be exploited by supplying
data to APIs in the specified Component without using sandboxed Java Web Start
applications or sandboxed Java applets, such as through a web service. CVSS 3.1
Base Score 3.7 (Availability impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2020-14583
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: Libraries). Supported versions that are affected are Java SE: 7u261,
8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks require
human interaction from a person other than the attacker and while the
vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact
additional products. Successful attacks of this vulnerability can result in
takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start applications
or sandboxed Java applets, that load and run untrusted code (e.g., code that
comes from the internet) and rely on the Java sandbox for security. This
vulnerability does not apply to Java deployments, typically in servers, that
load and run only trusted code (e.g., code installed by an administrator). CVSS
3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS
Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
CVE-2020-14593
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251,
11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability
allows unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded. Successful attacks require human
interaction from a person other than the attacker and while the vulnerability is
in Java SE, Java SE Embedded, attacks may significantly impact additional
products. Successful attacks of this vulnerability can result in unauthorized
creation, deletion or modification access to critical data or all Java SE, Java
SE Embedded accessible data. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start applications
or sandboxed Java applets, that load and run untrusted code (e.g., code that
comes from the internet) and rely on the Java sandbox for security. This
vulnerability does not apply to Java deployments, typically in servers, that
load and run only trusted code (e.g., code installed by an administrator). CVSS
3.1 Base Score 7.4 (Integrity impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
CVE-2020-14621
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE
(component: JAXP). Supported versions that are affected are Java SE: 7u261,
8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Java SE, Java SE Embedded. Successful attacks of this
vulnerability can result in unauthorized update, insert or delete access to some
of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only
be exploited by supplying data to APIs in the specified Component without using
Untrusted Java Web Start applications or Untrusted Java applets, such as through
a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-1.8.0-openjdk-1.8.0.262.b10-0.0.1.AXS4.src.rpm
    MD5: f018667858af4925e3622ab8e3fec5eb
    SHA-256: ee2431aa6466305bf401ea6272c21b68c73d47881309fefadcdb9eefe11a5aaa
    Size: 55.07 MB

Asianux Server 4 for x86
  1. java-1.8.0-openjdk-1.8.0.262.b10-0.0.1.AXS4.i686.rpm
    MD5: 78edddba0bf49ec270b080e42d0e292b
    SHA-256: 3dedf59c14b780f77d6e8b99fad61d5c909e01b3c9936bca0b8121703e63bccf
    Size: 225.34 kB
  2. java-1.8.0-openjdk-devel-1.8.0.262.b10-0.0.1.AXS4.i686.rpm
    MD5: 1a1987bbfc1f7b77157c1a55cec9b5f3
    SHA-256: 1a38f6ef19ba3252914d547b8369ac136873f18fd073e70990091657ea0d4785
    Size: 10.11 MB
  3. java-1.8.0-openjdk-headless-1.8.0.262.b10-0.0.1.AXS4.i686.rpm
    MD5: f3ba91d1527302081847e4e6d5678078
    SHA-256: c1f90137a6212ba2d3687dbea6fe9d2d342a1011671a35290ee6722f5e65b56f
    Size: 31.79 MB

Asianux Server 4 for x86_64
  1. java-1.8.0-openjdk-1.8.0.262.b10-0.0.1.AXS4.x86_64.rpm
    MD5: b91640a2a0be3129daf355723928bbe1
    SHA-256: 87c4a2f33b256458c4ca2da5a9247988f878047ad5e8931604103d06497d355f
    Size: 238.27 kB
  2. java-1.8.0-openjdk-devel-1.8.0.262.b10-0.0.1.AXS4.x86_64.rpm
    MD5: 657b50e004324c3e776300814b88f5de
    SHA-256: 967ce294cf4dcc6bef330e19957691a51921969573aa7b717da40c3b551a18d6
    Size: 10.11 MB
  3. java-1.8.0-openjdk-headless-1.8.0.262.b10-0.0.1.AXS4.x86_64.rpm
    MD5: 76141c7f85e005b3f51bc54b55c28555
    SHA-256: dfa249e781fb5128b4f7d43c7442cde4ae4cea58a246233e229755fb46aead83
    Size: 32.88 MB