USN-3735-1: OpenJDK 7 vulnerability
10 August 2018
Java applications could be made to use excessive memory.
Releases
Packages
- openjdk-7 - Open Source Java implementation
Details
It was discovered that the PatternSyntaxException class in OpenJDK did not
properly validate arguments passed to it. An attacker could use this to
potentially construct a class that caused a denial of service (excessive
memory consumption).
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
icedtea-7-jre-jamvm
-
7u181-2.6.14-0ubuntu0.2
-
openjdk-7-jdk
-
7u181-2.6.14-0ubuntu0.2
-
openjdk-7-jre
-
7u181-2.6.14-0ubuntu0.2
-
openjdk-7-jre-headless
-
7u181-2.6.14-0ubuntu0.2
-
openjdk-7-jre-lib
-
7u181-2.6.14-0ubuntu0.2
After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.