java-1.7.0-openjdk-1.7.0.211-2.6.17.1.0.1.el7.AXS7
エラータID: AXSA:2019-3841:02
リリース日:
2019/04/19 Friday - 09:09
題名:
java-1.7.0-openjdk-1.7.0.211-2.6.17.1.0.1.el7.AXS7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- Oracle Java SE のコンポーネント (サブコンポーネント:Libraries) には、
ネットワークアクセス可能な認証されていない攻撃者が、Java SE のアクセス可能な
データのサブセットに不正な読み込みを行うことができる脆弱性があります。
(CVE-2019-2422)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2019-2422
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
追加情報:
N/A
ダウンロード:
SRPMS
- java-1.7.0-openjdk-1.7.0.211-2.6.17.1.0.1.el7.AXS7.src.rpm
MD5: 7b7ab19f0a3331cc7c10bb798735b468
SHA-256: 5da90566d232c8daefad0b09f62918327e1570cdc221cf2e486948ec04c95d3d
Size: 39.33 MB
Asianux Server 7 for x86_64
- java-1.7.0-openjdk-1.7.0.211-2.6.17.1.0.1.el7.AXS7.x86_64.rpm
MD5: d0b4790389a6096d7dd1e2a4296f80a4
SHA-256: 84f11755a9ae65002a0199bc86dab4e5a0c558494ddc096d6e35f00e3d4abbae
Size: 241.45 kB - java-1.7.0-openjdk-devel-1.7.0.211-2.6.17.1.0.1.el7.AXS7.x86_64.rpm
MD5: 2443a7a23e5edc5a9e23861052bc7860
SHA-256: 8a91259d4f1d54b48bee0be5dce8dd6d01d9614ce975fb54524e5d406c0dfb10
Size: 9.22 MB - java-1.7.0-openjdk-headless-1.7.0.211-2.6.17.1.0.1.el7.AXS7.x86_64.rpm
MD5: 40e8b373c05f97b8ad19bde9b15cc62a
SHA-256: 471e90c813242645ee53ef5ba134bea672ec7552aaf62125f63e174507e1ad74
Size: 25.66 MB