[USN-3735-1] OpenJDK 7 vulnerability

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view

[USN-3735-1] OpenJDK 7 vulnerability

Steve Beattie
Ubuntu Security Notice USN-3735-1
August 10, 2018

openjdk-7 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS


Java applications could be made to use excessive memory.

Software Description:
- openjdk-7: Open Source Java implementation


It was discovered that the PatternSyntaxException class in OpenJDK did
not properly validate arguments passed to it. An attacker could use
this to potentially construct a class that caused a denial of service
(excessive memory consumption).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
  icedtea-7-jre-jamvm             7u181-2.6.14-0ubuntu0.2
  openjdk-7-jdk                   7u181-2.6.14-0ubuntu0.2
  openjdk-7-jre                   7u181-2.6.14-0ubuntu0.2
  openjdk-7-jre-headless          7u181-2.6.14-0ubuntu0.2
  openjdk-7-jre-lib               7u181-2.6.14-0ubuntu0.2

After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.


Package Information:

ubuntu-security-announce mailing list
[hidden email]
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

signature.asc (849 bytes) Download Attachment