java-1.7.0-openjdk-1.7.0.5-2.2.1.AXS4

エラータID: AXSA:2012-909:02

Release date: 
Monday, September 17, 2012 - 14:31
Subject: 
java-1.7.0-openjdk-1.7.0.5-2.2.1.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The OpenJDK runtime environment.

Security issues fixed with this release:

• CVE-2012-0547
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and "a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited." NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities.

• CVE-2012-1682
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136.

• CVE-2012-3136
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-1682.

• CVE-2012-4681
Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-1.7.0-openjdk-1.7.0.5-2.2.1.AXS4.3.src.rpm
    MD5: a2b6e301f54174e14bfd8829bc9cf529
    SHA-256: fc6bfef75647d62638689332b87affd73d057970e8d9fafba03bf3f801862d2e
    Size: 66.47 MB

Asianux Server 4 for x86
  1. java-1.7.0-openjdk-1.7.0.5-2.2.1.AXS4.3.i686.rpm
    MD5: d42e35bad51e050203e91c7081c606cc
    SHA-256: 6150247675960026026878fb0e8b4eca1471093e95291b65a27c89a416607b26
    Size: 26.73 MB

Asianux Server 4 for x86_64
  1. java-1.7.0-openjdk-1.7.0.5-2.2.1.AXS4.3.x86_64.rpm
    MD5: 08c8c6f57c73e25dcf30cbe04e17a165
    SHA-256: f6dd007d822d585e24b674ce1ef32ad6b5dff3f69cb574c80c66e84677f94882
    Size: 25.54 MB