USN-3734-1: OpenJDK 8 vulnerability

10 August 2018

Java applications could be made to use excessive memory.

Releases

Packages

  • openjdk-8 - Open Source Java implementation

Details

It was discovered that the PatternSyntaxException class in OpenJDK
did not properly validate arguments passed to it. An attacker could
use this to possibly construct a class that caused a denial of service
(excessive memory consumption).

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References

Related notices

  • USN-3735-1: icedtea-7-jre-jamvm, openjdk-7-doc, openjdk-7-demo, openjdk-7-jdk, openjdk-7-source, openjdk-7-jre, openjdk-7-jre-lib, openjdk-7-jre-headless, openjdk-7, openjdk-7-tests, openjdk-7-jre-zero
  • USN-3747-1: openjdk-lts, openjdk-11-jre, openjdk-11-doc, openjdk-11-jre-headless, openjdk-11-source, openjdk-11-demo, openjdk-11-jre-zero, openjdk-11-jdk, openjdk-11-jdk-headless