java-1.7.0-openjdk-1.7.0.131-2.6.9.0.AXS4

エラータID: AXSA:2017-1294:01

リリース日: 
2017/02/16 Thursday - 11:24
題名: 
java-1.7.0-openjdk-1.7.0.131-2.6.9.0.AXS4
影響のあるチャネル: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The OpenJDK runtime environment.

Security issues fixed with this release:

CVE-2016-5546
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized creation, deletion or
modification access to critical data or all Java SE, Java SE Embedded,
JRockit accessible data. Note: Applies to client and server deployment
of Java. This vulnerability can be exploited through sandboxed Java
Web Start applications and sandboxed Java applets. It can also be
exploited by supplying data to APIs in the specified Component without
using sandboxed Java Web Start applications or sandboxed Java applets,
such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity
impacts).
CVE-2016-5547
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized ability to cause a
partial denial of service (partial DOS) of Java SE, Java SE Embedded,
JRockit. Note: Applies to client and server deployment of Java. This
vulnerability can be exploited through sandboxed Java Web Start
applications and sandboxed Java applets. It can also be exploited by
supplying data to APIs in the specified Component without using
sandboxed Java Web Start applications or sandboxed Java applets, such
as through a web service. CVSS v3.0 Base Score 5.3 (Availability
impacts).
CVE-2016-5548
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can
result in unauthorized access to critical data or complete access to
all Java SE, Java SE Embedded accessible data. Note: This
vulnerability applies to Java deployments, typically in clients
running sandboxed Java Web Start applications or sandboxed Java
applets, that load and run untrusted code (e.g., code that comes from
the internet) and rely on the Java sandbox for security. This
vulnerability does not apply to Java deployments, typically in
servers, that load and run only trusted code (e.g., code installed by
an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
CVE-2016-5552
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: Networking). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized update, insert or delete
access to some of Java SE, Java SE Embedded, JRockit accessible data.
Note: Applies to client and server deployment of Java. This
vulnerability can be exploited through sandboxed Java Web Start
applications and sandboxed Java applets. It can also be exploited by
supplying data to APIs in the specified Component without using
sandboxed Java Web Start applications or sandboxed Java applets, such
as through a web service. CVSS v3.0 Base Score 5.3 (Integrity
impacts).
CVE-2017-3231
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Networking). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can
result in unauthorized read access to a subset of Java SE, Java SE
Embedded accessible data. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code
(e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3
(Confidentiality impacts).
CVE-2017-3241
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: RMI). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. While the vulnerability
is in Java SE, Java SE Embedded, JRockit, attacks may significantly
impact additional products. Successful attacks of this vulnerability
can result in takeover of Java SE, Java SE Embedded, JRockit. Note:
This vulnerability can only be exploited by supplying data to APIs in
the specified Component without using Untrusted Java Web Start
applications or Untrusted Java applets, such as through a web service.
CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability
impacts).
CVE-2017-3252
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: JAAS). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Difficult to exploit vulnerability allows low
privileged attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks
require human interaction from a person other than the attacker and
while the vulnerability is in Java SE, Java SE Embedded, JRockit,
attacks may significantly impact additional products. Successful
attacks of this vulnerability can result in unauthorized creation,
deletion or modification access to critical data or all Java SE, Java
SE Embedded, JRockit accessible data. Note: Applies to client and
server deployment of Java. This vulnerability can be exploited through
sandboxed Java Web Start applications and sandboxed Java applets. It
can also be exploited by supplying data to APIs in the specified
Component without using sandboxed Java Web Start applications or
sandboxed Java applets, such as through a web service. CVSS v3.0 Base
Score 5.8 (Integrity impacts).
CVE-2017-3253
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: 2D). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized ability to cause a hang
or frequently repeatable crash (complete DOS) of Java SE, Java SE
Embedded, JRockit. Note: Applies to client and server deployment of
Java. This vulnerability can be exploited through sandboxed Java Web
Start applications and sandboxed Java applets. It can also be
exploited by supplying data to APIs in the specified Component without
using sandboxed Java Web Start applications or sandboxed Java applets,
such as through a web service. CVSS v3.0 Base Score 7.5 (Availability
impacts).
CVE-2017-3261
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Networking). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can
result in unauthorized read access to a subset of Java SE, Java SE
Embedded accessible data. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code
(e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3
(Confidentiality impacts).
CVE-2017-3272
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker and while the vulnerability is in Java SE,
Java SE Embedded, attacks may significantly impact additional
products. Successful attacks of this vulnerability can result in
takeover of Java SE, Java SE Embedded. Note: This vulnerability
applies to Java deployments, typically in clients running sandboxed
Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely
on the Java sandbox for security. This vulnerability does not apply to
Java deployments, typically in servers, that load and run only trusted
code (e.g., code installed by an administrator). CVSS v3.0 Base Score
9.6 (Confidentiality, Integrity and Availability impacts).
CVE-2017-3289
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Hotspot). Supported versions that are affected
are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily
exploitable vulnerability allows unauthenticated attacker with network
access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks require human interaction from a person other than
the attacker and while the vulnerability is in Java SE, Java SE
Embedded, attacks may significantly impact additional products.
Successful attacks of this vulnerability can result in takeover of
Java SE, Java SE Embedded. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code
(e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6
(Confidentiality, Integrity and Availability impacts).

解決策: 

Update package.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. java-1.7.0-openjdk-1.7.0.131-2.6.9.0.AXS4.src.rpm
    MD5: a8c7b2c96e68af63bda53a28a75d5a5b
    SHA-256: df87c10b4431cd568656360ad61d63bf1b0e334776f1cacbce9021ba35276d6c
    Size: 39.17 MB

Asianux Server 4 for x86
  1. java-1.7.0-openjdk-1.7.0.131-2.6.9.0.AXS4.i686.rpm
    MD5: 57113a793d09623980b3bd1df742b2e1
    SHA-256: d94eb108be16bbcd3829a2bbafe141640d20cdfd61d10fae2daca664ea7bc90b
    Size: 27.54 MB
  2. java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.AXS4.i686.rpm
    MD5: f23ddc2e9f9bdbb13fcd6b974b8be82d
    SHA-256: 5bb424a277ec16e20b07caf491afeead9c52f29db9108418ffdbd7244c86a700
    Size: 9.47 MB

Asianux Server 4 for x86_64
  1. java-1.7.0-openjdk-1.7.0.131-2.6.9.0.AXS4.x86_64.rpm
    MD5: 9d62cf91a39c40be7a6db5b605340c1d
    SHA-256: 9a89c6836923c7c97d6d98aabf31428774dd6e1314a1dcb35c2c004765f0d520
    Size: 26.34 MB
  2. java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.AXS4.x86_64.rpm
    MD5: e1b46e15acc3ae7f00aea79b0b0e08d5
    SHA-256: b87819b10514522240e06fc34af8c9e8b940fa4ead547ee5ec7e7a51a1432d6e
    Size: 9.46 MB