java-1.8.0-openjdk-1.8.0.272.b10-1.el8
エラータID: AXSA:2020-816:16
以下項目について対処しました。
[Security Fix]
- Java SE Serialization コンポーネントには、Java SE、
又はJava SE Embedded を攻撃するために複数のプロトコルを
介してネットワークからアクセスしている認証されていない
攻撃者が、許可されていない権限を取得し、Java SE、
又は Java SE Embedded の部分的なサービス拒否を
引き起こす脆弱性があります。(CVE-2020-14779)
- Java SE の JDNI コンポーネントには、Java SE、
又はJava SE Embedded を攻撃するために複数の
プロトコルを介してネットワークからアクセスしている
認証されていない攻撃者が、Java SE、又は Java SE
Embedded のアクセス可能なデータのサブセットを
不正に読み込めてしまう脆弱性があります。(CVE-2020-14781)
- Java SE の Libraries コンポーネントには、
認証されていない攻撃者が複数のプロトコルの
ネットワークを介して、Java SE、Java SE Embedded の
アクセス可能なデータを不正に更新、挿入、
あるいは削除できてしまう脆弱性があります。(CVE-2020-14782)
- Java SE の Hotspot コンポーネントには、
認証されていない攻撃者が複数のプロトコルの
ネットワークアクセスを介して、Java SE、
Java SE Embedded のアクセス可能なデータの
サブセットを不正に読み込めてしまうとともに、
データを不正に更新、挿入、削除できてしまう
脆弱性があります。(CVE-2020-14792)
- Java SE の Libraries コンポーネントには、認証
されていない攻撃者が複数のプロトコルの
ネットワークアクセスを介して、 Java SE、
Java SE Embedded のアクセス可能なデータの
サブセットを不正に読み込めてしまう脆弱性が
あります。(CVE-2020-14796)
- Java SE の Libraries コンポーネントには、
認証されていない攻撃者が複数のネットワークアクセスを
介して、 Java SE 、 Java SE Embedded のアクセス可能な
データのサブセットを不正に読み込めてしまう
脆弱性があります。(CVE-2020-14803)
パッケージをアップデートしてください。
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
N/A
SRPMS
- java-1.8.0-openjdk-1.8.0.272.b10-1.el8.src.rpm
MD5: 89722a74d21016de17dc99d936ab6688
SHA-256: 89ad0baa69a0a4755109f0d88dc8fcdf8ffeb7c00ead713f89f7eff8e232f2f2
Size: 55.55 MB
Asianux Server 8 for x86_64
- java-1.8.0-openjdk-1.8.0.272.b10-1.el8.x86_64.rpm
MD5: 0de3f4da7d0f5874e1dc188af53820b8
SHA-256: afa7eb42b6c9478277d7f5dcbaf65084c5c083bf7e6d524ef1c9e67cb3eb1a2d
Size: 324.71 kB - java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el8.x86_64.rpm
MD5: 5300558f9772c4a5688f7693c7aa515a
SHA-256: a63057d6d76688aa9c47937e506f910cbc2df151cadd5ed10bd5992f9e5884b9
Size: 87.24 kB - java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el8.x86_64.rpm
MD5: 18dc1728bc93ad4d7d36c85d5ffce241
SHA-256: 4928260c744d7afcb07901dfd3a4ba76a1e22851bf5393d536b067968f048e7d
Size: 1.99 MB - java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el8.x86_64.rpm
MD5: 9e2b92d11663afe38efd072b15d3fdef
SHA-256: def5cc3428de305dfcb799ffa3196d55f6bd1401837a364623c4b57873f640e3
Size: 9.83 MB - java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el8.x86_64.rpm
MD5: 6dabbe26fc7b33e37cb66a67419e440f
SHA-256: dd9f3e41275c5893e07c6c3befcf310d4689e801fee62f4b409bf1c29739e18e
Size: 33.79 MB - java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el8.noarch.rpm
MD5: 75ac6f90c696099e1c5b66e1d9f73472
SHA-256: 994e6d71ef6cf565e500a47617fdfbeba69cee8de15032eda6f8e8587a68bf9a
Size: 15.16 MB - java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el8.noarch.rpm
MD5: 54eac81df98b0dfd9c068e8a953f95e2
SHA-256: 77584ffb77d08d4b1a1306c7ce81a944584c88922682d4877b902d0d4db6c6cb
Size: 41.71 MB - java-1.8.0-openjdk-src-1.8.0.272.b10-1.el8.x86_64.rpm
MD5: 3257a55cc1ee25b2a74b676868bc3f1a
SHA-256: d96af991cfcaee5e6e8ff99dd47009fdab1762e803a77a9da3929c374419c9bb
Size: 45.54 MB