java-1.7.0-openjdk-1.7.0.201-2.6.16.1.0.1.el7.AXS7
エラータID: AXSA:2019-3680:01
以下項目について対処しました。
[Security Fix]
- Oracle Java SE (サブコンポーネント:Hotspot) には、ネットワー
クアクセス可能な認証されていない攻撃者が、Java SE を乗っ取
ることができる脆弱性があります。(CVE-2018-3169)
- Oracle Java SE のコンポーネント (サブコンポーネント:JNDI)
には、ネットワークアクセス可能な認証されていない攻撃者が、
Java SE を乗っ取ることができる脆弱性があります。
(CVE-2018-3149)
- Oracle Java SE (サブコンポーネント:Security) には、ネットワ
ークアクセス可能な認証されていない攻撃者が、Java SE のア
クセス可能なデータに不正なアップデート、挿入、削除アクセス
を行うことができる脆弱性があります。(CVE-2018-3136)
- Oracle Java SE のコンポーネント (サブコンポーネント:Net
working) には、ネットワークアクセス可能な認証されていない
攻撃者が、Java SE のアクセス可能なデータの一部に、読み
込みアクセスを行うことができる脆弱性があります。
(CVE-2018-3139)
- Oracle Java SE のコンポーネント (サブコンポーネント:
JSSE) には、SSL/TLSを経由してネットワークアクセス可能
な認証されていない攻撃者が部分的にサービス拒否 (DoS)
を引き起こすことができる脆弱性があります。(CVE-2018-3180)
- Oracle Java SE (サブコンポーネント:Sound) には、ネットワー
クアクセス可能な認証されていない攻撃者が、Java SE の部分
的なサービス拒否 (DoS) を引き起こすことができる脆弱性があ
ります。(CVE-2018-3214)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
パッケージをアップデートしてください。
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
N/A
SRPMS
- java-1.7.0-openjdk-1.7.0.201-2.6.16.1.0.1.el7.AXS7.src.rpm
MD5: c20a8abaf98720f7b742403e5de3f125
SHA-256: 6a20c6efe2bd392f187ded5988be4e4186b6168a84def5158d53cffa1d02a211
Size: 39.30 MB
Asianux Server 7 for x86_64
- java-1.7.0-openjdk-1.7.0.201-2.6.16.1.0.1.el7.AXS7.x86_64.rpm
MD5: 6590cb12417f5eb1850a25536cd87870
SHA-256: d651867548c434dba7f821946b689a0fb92de7e27058d08a669ad968743da9ae
Size: 240.59 kB - java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.0.1.el7.AXS7.x86_64.rpm
MD5: e0fd24fe309c8143352914ce07871c7f
SHA-256: 6ae4e04ec6db748e859f3f3c756a8daec50bdc6c6e987cbc068bb1bcfa2f8b5f
Size: 9.22 MB - java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.0.1.el7.AXS7.x86_64.rpm
MD5: 900abe9a57e6905053b6b08d62cf7130
SHA-256: a476ff5baeb1901abdd660264ccde7b2586e280ecff4b5423ddf243f8a7fd989
Size: 25.62 MB