USN-3735-1: OpenJDK 7 vulnerability

10 August 2018

Java applications could be made to use excessive memory.

Releases

Packages

  • openjdk-7 - Open Source Java implementation

Details

It was discovered that the PatternSyntaxException class in OpenJDK did not
properly validate arguments passed to it. An attacker could use this to
potentially construct a class that caused a denial of service (excessive
memory consumption).

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04

After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References

Related notices

  • USN-3734-1: openjdk-8-jre, openjdk-8, openjdk-8-jdk, openjdk-8-jre-jamvm, openjdk-8-jre-headless
  • USN-3747-1: openjdk-11-jre-headless, openjdk-11-jre, openjdk-lts, openjdk-11-jre-zero