USN-3734-1: OpenJDK 8 vulnerability
10 August 2018
Java applications could be made to use excessive memory.
Releases
Packages
- openjdk-8 - Open Source Java implementation
Details
It was discovered that the PatternSyntaxException class in OpenJDK
did not properly validate arguments passed to it. An attacker could
use this to possibly construct a class that caused a denial of service
(excessive memory consumption).
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
openjdk-8-jdk
-
8u181-b13-0ubuntu0.16.04.1
-
openjdk-8-jre
-
8u181-b13-0ubuntu0.16.04.1
-
openjdk-8-jre-headless
-
8u181-b13-0ubuntu0.16.04.1
-
openjdk-8-jre-jamvm
-
8u181-b13-0ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.