java-11-openjdk-11.0.12.0.7-0.el7
エラータID: AXSA:2021-2242:10
リリース日:
2021/07/22 Thursday - 07:13
題名:
java-11-openjdk-11.0.12.0.7-0.el7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- Java SE には、未認証の攻撃者が複数のプロトコルを介してネットワークにアクセスして
Java SE に侵入し、攻撃者以外の人間が介在することで、Java SE がアクセス可能なデー
タのサブセットへ、未承認の読み込りアクセスを行う脆弱性があります。(CVE-2021-2341)
- Java SE には、未認証の攻撃者が複数のプロトコルを介してネットワークにアクセスして
Java SE に侵入し、攻撃者以外の人間が介在することで、Java SE がアクセス可能なデー
タに対して不正な更新や、挿入、削除される脆弱性があります。(CVE-2021-2369)
- Java SE には、未認証の攻撃者が複数のプロトコルを介してネットワークにアクセスして
Java SE に侵入し、攻撃者以外の人間が介在することで、Java SE が乗っ取られる脆弱性
があります。(CVE-2021-2388)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2021-2341
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
CVE-2021-2369
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
CVE-2021-2388
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
追加情報:
N/A
ダウンロード:
SRPMS
- java-11-openjdk-11.0.12.0.7-0.el7.src.rpm
MD5: d4c28a1403293bb3044d99daca5e476f
SHA-256: 16bcea2b45e957e005d3d18c4306be515c1922290ac60eef3b4052d07a2ee41e
Size: 75.10 MB
Asianux Server 7 for x86_64
- java-11-openjdk-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 95d768fb535c0d021091a26110ba2476
SHA-256: 605404ef37ae7729fc263a908e1e436d333cc023b332bb205958fe177ee8ca9a
Size: 230.80 kB - java-11-openjdk-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 7286dd49ad8ff12b3601402630294fa4
SHA-256: daf12c2d63505caaaa487a3ec0ee3fca5cb94b9a50d20b3abf84efa10aa6483d
Size: 235.94 kB - java-11-openjdk-demo-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 6625759594e223f4e35102bc5260fb91
SHA-256: f195c3f620b3a3e7e12d1eef61e368db0660f81c2c1a8636de674bf5e546b658
Size: 4.35 MB - java-11-openjdk-demo-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 19cb4747b3f2217ce72bde3b9b3edb25
SHA-256: 28a177a7200e10f861c3057eb68e1ae0bed83082699b44221239faafdfa18b8d
Size: 4.35 MB - java-11-openjdk-devel-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 958091d75a161784be2308d945895efe
SHA-256: f85997ad956a5271354cb26b4bb129bd4bc6699ffc0476a107dc3fc0619dd017
Size: 3.37 MB - java-11-openjdk-devel-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: fe4ec7335dbfe42e2ca0c72966b2ef54
SHA-256: 7f61daa71a969917ff20cfee32418e6293cfd3b77c64807e79a2d6a0de5f64d3
Size: 3.37 MB - java-11-openjdk-headless-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 9424911fa19e858762b8af38e0a3db5e
SHA-256: 33659eb718bd5a007ab3f773ce41a8fcbd7a5c7cb68257a5963c6e24718ee366
Size: 39.18 MB - java-11-openjdk-headless-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 8177575cf2922f996d52139e7357e0bf
SHA-256: 8c4a0163860df41ffd24998bcc2d7f56a787a53b5c39d6650c4f05d4d4ce9f80
Size: 41.78 MB - java-11-openjdk-javadoc-11.0.12.0.7-0.el7.x86_64.rpm
MD5: f7b0d7aaa563cf150578957680ac71e6
SHA-256: cb54d0d98ee38b3a7417912a232b3ab16906ec995c0750c1d5a6ce4e2582445f
Size: 16.09 MB - java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 817a250e1fa69e758812f6c20651c637
SHA-256: 0766d7992d2d1953918c77a8d577ceac93c101a3db2005e09da30fe0e7207430
Size: 16.09 MB - java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 890e14477ec3da9072b76386189bfa18
SHA-256: a50ac4cf1af06ba4376d10b238915751966f7153140225daf78d140d80951122
Size: 41.94 MB - java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 8cd8ca6b688d65600bb390041b662b9d
SHA-256: f265676022024a0a9b6b1f821800aae060a846df6f31f3bbf1a421aedc7d51f6
Size: 41.94 MB - java-11-openjdk-jmods-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 0c7ddb3fbba75acdfc7d6483953d3d20
SHA-256: bec957724bc8a5d48511ff0a23246920e7b41468deab80a1246d42fe8ef7ffd4
Size: 309.89 MB - java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 3e21aaada8a01addcdd8fe02d3c8fa02
SHA-256: 09dd165ffa2c2b599f234cd18d5a6bf5b15bbe3ada88efde8b08279293d6497b
Size: 177.47 MB - java-11-openjdk-src-11.0.12.0.7-0.el7.x86_64.rpm
MD5: 7a8373a5204b226d388728d1b49ea1b5
SHA-256: 506bcedcd06b858f87bfe5d1c30d0fe2db8b1aff7ea8baae4b93d58a2f280cda
Size: 50.34 MB - java-11-openjdk-src-debug-11.0.12.0.7-0.el7.x86_64.rpm
MD5: de9bcbd0c178d0b5b79566f7010b1647
SHA-256: 18fd43d27feb73a5dda3d40d1ee4dd9c6c591a83f95e42bed839b80e8224de22
Size: 50.35 MB - java-11-openjdk-11.0.12.0.7-0.el7.i686.rpm
MD5: 4645e7b2a985c541b3f0c9ccd670fa7e
SHA-256: 7884f72626d2e4af829f7cb81b38bf01efc41cfd5b2a4b06aad74e491161e946
Size: 226.96 kB - java-11-openjdk-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: ccb84810ab904ccf644c4c5058310ed5
SHA-256: 37397cf47a818b912e703fa7d2bb7bffad1c0671aa9959f4f53ce9e97df11e79
Size: 230.07 kB - java-11-openjdk-demo-11.0.12.0.7-0.el7.i686.rpm
MD5: f4ee7c35cea7a7df412c8b5d90373070
SHA-256: f9a94c859883ed5b4ac08d5e067d2e5c75cca36ea1802ec059928b306102c92c
Size: 4.35 MB - java-11-openjdk-demo-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: a3aa12f4396a37e11fe13f4783fb7389
SHA-256: 808f2061effcae2002978aea46d4325dacc6366445f1c4b2ccc5e15d8445636a
Size: 4.35 MB - java-11-openjdk-devel-11.0.12.0.7-0.el7.i686.rpm
MD5: 82e99c7d9896b23d4b6862a4137128e9
SHA-256: 6eadf05b591ca89a99ad16510e04a54df58ae520bf9d15bb48c39d2af8c62da8
Size: 3.35 MB - java-11-openjdk-devel-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: a3f4eaa656b56a16a628c7d7ce52bf60
SHA-256: db78df5f7c17057aee33e2d9154e42dc6e8e90ffe7f08646d03248b6889d8265
Size: 3.35 MB - java-11-openjdk-headless-11.0.12.0.7-0.el7.i686.rpm
MD5: 84a81b5a70cd83a87cc72789dddc9a69
SHA-256: c5a29739409dc6ee7974bb695d425babf892fbce33a43ea9cbb81bd1dbd7cac8
Size: 35.29 MB - java-11-openjdk-headless-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: fe93a2225bff99decb71ffd9317a393b
SHA-256: c187606a5f990fec0c0933b90be17718994aaaf923f476a5524e7cba842e942c
Size: 37.29 MB - java-11-openjdk-javadoc-11.0.12.0.7-0.el7.i686.rpm
MD5: 7e804b3935ac0f4efc29cf5c8f0fbd21
SHA-256: e2af4852f029ed022d865474e36139a9346786f5a34282d759cf48420a0a0341
Size: 16.09 MB - java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: fee1f75532264d5eba9c99a9edd68441
SHA-256: 5c22bddaa9a377d5d79e7607ec0995c0507324c1cd095879927d08e8d2d77040
Size: 16.09 MB - java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7.i686.rpm
MD5: c1df93fb9452778806bf855c42fa826d
SHA-256: c1b07682b98bbfc4c58bc9368a150ddcbb40d593cc230c4e2807ce7ed1d4adde
Size: 41.97 MB - java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: 7715f8040d826556d3c4584ba3e7df14
SHA-256: 51d6b6ea67275ac766e2344b8ed9d3c38637d8ce96d294976340c03a04ade034
Size: 41.97 MB - java-11-openjdk-jmods-11.0.12.0.7-0.el7.i686.rpm
MD5: a3ec0b2208de1cac63fb3054818f56b5
SHA-256: 0a786e671af57a1cede1a6baa7613d981dfa6a617b8798b191526c24dd2e7500
Size: 262.03 MB - java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: 252894dc2c54efc49b21b0260fd3df12
SHA-256: 0a6bcb8b746365d727157d76dfac37cdd6396df752c1d69b6e6851e4d2b01d9c
Size: 150.56 MB - java-11-openjdk-src-11.0.12.0.7-0.el7.i686.rpm
MD5: aecd9ddd015860f1724f1ff96e674344
SHA-256: 1b59478d3e32c387fdd8b5f9d2d4056597ccff40b7d81304e6dd90b5a3cfbc2f
Size: 45.60 MB - java-11-openjdk-src-debug-11.0.12.0.7-0.el7.i686.rpm
MD5: 33ec396698da4c4e7f32fdb5f99f96b7
SHA-256: 905d469cc7a089a99ea96aac0e8306c0b74a7e01941b6a8dee59c79e07823e32
Size: 45.60 MB