java-1.7.0-openjdk-1.7.0.131-2.6.9.0.0.1.el7.AXS7

エラータID: AXSA:2017-1295:01

リリース日: 
2017/02/16 Thursday - 16:28
題名: 
java-1.7.0-openjdk-1.7.0.131-2.6.9.0.0.1.el7.AXS7
影響のあるチャネル: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The OpenJDK runtime environment.

Security issues fixed with this release:

CVE-2016-5546
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized creation, deletion or
modification access to critical data or all Java SE, Java SE Embedded,
JRockit accessible data. Note: Applies to client and server deployment
of Java. This vulnerability can be exploited through sandboxed Java
Web Start applications and sandboxed Java applets. It can also be
exploited by supplying data to APIs in the specified Component without
using sandboxed Java Web Start applications or sandboxed Java applets,
such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity
impacts).
CVE-2016-5547
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized ability to cause a
partial denial of service (partial DOS) of Java SE, Java SE Embedded,
JRockit. Note: Applies to client and server deployment of Java. This
vulnerability can be exploited through sandboxed Java Web Start
applications and sandboxed Java applets. It can also be exploited by
supplying data to APIs in the specified Component without using
sandboxed Java Web Start applications or sandboxed Java applets, such
as through a web service. CVSS v3.0 Base Score 5.3 (Availability
impacts).
CVE-2016-5548
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can
result in unauthorized access to critical data or complete access to
all Java SE, Java SE Embedded accessible data. Note: This
vulnerability applies to Java deployments, typically in clients
running sandboxed Java Web Start applications or sandboxed Java
applets, that load and run untrusted code (e.g., code that comes from
the internet) and rely on the Java sandbox for security. This
vulnerability does not apply to Java deployments, typically in
servers, that load and run only trusted code (e.g., code installed by
an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
CVE-2016-5552
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: Networking). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized update, insert or delete
access to some of Java SE, Java SE Embedded, JRockit accessible data.
Note: Applies to client and server deployment of Java. This
vulnerability can be exploited through sandboxed Java Web Start
applications and sandboxed Java applets. It can also be exploited by
supplying data to APIs in the specified Component without using
sandboxed Java Web Start applications or sandboxed Java applets, such
as through a web service. CVSS v3.0 Base Score 5.3 (Integrity
impacts).
CVE-2017-3231
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Networking). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can
result in unauthorized read access to a subset of Java SE, Java SE
Embedded accessible data. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code
(e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3
(Confidentiality impacts).
CVE-2017-3241
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: RMI). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. While the vulnerability
is in Java SE, Java SE Embedded, JRockit, attacks may significantly
impact additional products. Successful attacks of this vulnerability
can result in takeover of Java SE, Java SE Embedded, JRockit. Note:
This vulnerability can only be exploited by supplying data to APIs in
the specified Component without using Untrusted Java Web Start
applications or Untrusted Java applets, such as through a web service.
CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability
impacts).
CVE-2017-3252
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: JAAS). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Difficult to exploit vulnerability allows low
privileged attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks
require human interaction from a person other than the attacker and
while the vulnerability is in Java SE, Java SE Embedded, JRockit,
attacks may significantly impact additional products. Successful
attacks of this vulnerability can result in unauthorized creation,
deletion or modification access to critical data or all Java SE, Java
SE Embedded, JRockit accessible data. Note: Applies to client and
server deployment of Java. This vulnerability can be exploited through
sandboxed Java Web Start applications and sandboxed Java applets. It
can also be exploited by supplying data to APIs in the specified
Component without using sandboxed Java Web Start applications or
sandboxed Java applets, such as through a web service. CVSS v3.0 Base
Score 5.8 (Integrity impacts).
CVE-2017-3253
Vulnerability in the Java SE, Java SE Embedded, JRockit component of
Oracle Java SE (subcomponent: 2D). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111;
JRockit: R28.3.12. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Java SE Embedded, JRockit. Successful attacks of
this vulnerability can result in unauthorized ability to cause a hang
or frequently repeatable crash (complete DOS) of Java SE, Java SE
Embedded, JRockit. Note: Applies to client and server deployment of
Java. This vulnerability can be exploited through sandboxed Java Web
Start applications and sandboxed Java applets. It can also be
exploited by supplying data to APIs in the specified Component without
using sandboxed Java Web Start applications or sandboxed Java applets,
such as through a web service. CVSS v3.0 Base Score 7.5 (Availability
impacts).
CVE-2017-3261
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Networking). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker. Successful attacks of this vulnerability can
result in unauthorized read access to a subset of Java SE, Java SE
Embedded accessible data. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code
(e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3
(Confidentiality impacts).
CVE-2017-3272
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Libraries). Supported versions that are
affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111.
Easily exploitable vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise Java SE, Java SE
Embedded. Successful attacks require human interaction from a person
other than the attacker and while the vulnerability is in Java SE,
Java SE Embedded, attacks may significantly impact additional
products. Successful attacks of this vulnerability can result in
takeover of Java SE, Java SE Embedded. Note: This vulnerability
applies to Java deployments, typically in clients running sandboxed
Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely
on the Java sandbox for security. This vulnerability does not apply to
Java deployments, typically in servers, that load and run only trusted
code (e.g., code installed by an administrator). CVSS v3.0 Base Score
9.6 (Confidentiality, Integrity and Availability impacts).
CVE-2017-3289
Vulnerability in the Java SE, Java SE Embedded component of Oracle
Java SE (subcomponent: Hotspot). Supported versions that are affected
are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily
exploitable vulnerability allows unauthenticated attacker with network
access via multiple protocols to compromise Java SE, Java SE Embedded.
Successful attacks require human interaction from a person other than
the attacker and while the vulnerability is in Java SE, Java SE
Embedded, attacks may significantly impact additional products.
Successful attacks of this vulnerability can result in takeover of
Java SE, Java SE Embedded. Note: This vulnerability applies to Java
deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted
code (e.g., code that comes from the internet) and rely on the Java
sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code
(e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6
(Confidentiality, Integrity and Availability impacts).

解決策: 

Update package.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. java-1.7.0-openjdk-1.7.0.131-2.6.9.0.0.1.el7.AXS7.src.rpm
    MD5: 96c373d2f1d46216de316a827112ed7b
    SHA-256: 6f8ca09a536f327694cbb9dba176ff3fbe202c779140bd5efb9151b19426efed
    Size: 39.06 MB

Asianux Server 7 for x86_64
  1. java-1.7.0-openjdk-1.7.0.131-2.6.9.0.0.1.el7.AXS7.x86_64.rpm
    MD5: 6dc45fac3838afdbbc923078ca318409
    SHA-256: 96cbd3bfd77afd1d9055b2f7a3460a99818e137dfd4553ad6915232e4d63b416
    Size: 229.50 kB
  2. java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.0.1.el7.AXS7.x86_64.rpm
    MD5: 47e4cc1a5021aaa4dffc1377e4069d96
    SHA-256: 26a230ca8e9775d2076632b411a9556375261c2159a2cbce12681685778f84f9
    Size: 9.14 MB
  3. java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.0.1.el7.AXS7.x86_64.rpm
    MD5: 5a7c86db0a7728d538f8bd825f89c8a0
    SHA-256: 9e950e34bf3930307816d0f91bdab57ec55604fd2f2b980d64076358c1fcb3fb
    Size: 25.41 MB