openjdk-7 vulnerability

Related Vulnerabilities: CVE-2018-2952  

Java applications could be made to use excessive memory.

It was discovered that the PatternSyntaxException class in OpenJDK did not properly validate arguments passed to it. An attacker could use this to potentially construct a class that caused a denial of service (excessive memory consumption).

10 August 2018

openjdk-7 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS

Summary

Java applications could be made to use excessive memory.

Software Description

  • openjdk-7 - Open Source Java implementation

Details

It was discovered that the PatternSyntaxException class in OpenJDK did not properly validate arguments passed to it. An attacker could use this to potentially construct a class that caused a denial of service (excessive memory consumption).

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS
icedtea-7-jre-jamvm - 7u181-2.6.14-0ubuntu0.2
openjdk-7-jdk - 7u181-2.6.14-0ubuntu0.2
openjdk-7-jre - 7u181-2.6.14-0ubuntu0.2
openjdk-7-jre-headless - 7u181-2.6.14-0ubuntu0.2
openjdk-7-jre-lib - 7u181-2.6.14-0ubuntu0.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any Java applications or applets to make all the necessary changes.

References