4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
43.5%
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of
Oracle Java SE (component: Library). Supported versions that are affected
are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise
Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows
unauthenticated attacker with network access via multiple protocols to
compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks
require human interaction from a person other than the attacker. Successful
attacks of this vulnerability can result in unauthorized update, insert or
delete access to some of Java SE, Oracle GraalVM Enterprise Edition
accessible data. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or
sandboxed Java applets, that load and run untrusted code (e.g., code that
comes from the internet) and rely on the Java sandbox for security. This
vulnerability does not apply to Java deployments, typically in servers,
that load and run only trusted code (e.g., code installed by an
administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
Author | Note |
---|---|
sbeattie | the fix for this issue changes OpenJDK’s behavior such that JAR file with multiple manifest files to be treated as unsigned. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | openjdk-8 | < 8u312-b07-0ubuntu1~18.04 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-8 | < 8u312-b07-0ubuntu1~20.04 | UNKNOWN |
ubuntu | 21.04 | noarch | openjdk-8 | < 8u312-b07-0ubuntu1~21.04 | UNKNOWN |
ubuntu | 16.04 | noarch | openjdk-8 | < 8u312-b07-0ubuntu1~16.04) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | openjdk-lts | < 11.0.13+8-0ubuntu1~18.04 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-lts | < 11.0.13+8-0ubuntu1~20.04 | UNKNOWN |
ubuntu | 21.04 | noarch | openjdk-lts | < 11.0.13+8-0ubuntu1~21.04 | UNKNOWN |
ubuntu | 21.10 | noarch | openjdk-lts | < 11.0.12+7-0ubuntu1 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-lts | < 11.0.12+7-0ubuntu1 | UNKNOWN |
ubuntu | 22.10 | noarch | openjdk-lts | < 11.0.12+7-0ubuntu1 | UNKNOWN |
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
43.5%