{"id":"USN-3396-1","summary":"openjdk-7 vulnerabilities","details":"It was discovered that the JPEGImageReader class in OpenJDK would\nincorrectly read unused image data. An attacker could use this to specially\nconstruct a jpeg image file that when opened by a Java application would\ncause a denial of service. (CVE-2017-10053)\n\nIt was discovered that the JAR verifier in OpenJDK did not properly handle\narchives containing files missing digests. An attacker could use this to\nmodify the signed contents of a JAR file. (CVE-2017-10067)\n\nIt was discovered that integer overflows existed in the Hotspot component\nof OpenJDK when generating range check loop predicates. An attacker could\nuse this to specially construct an untrusted Java application or applet\nthat could escape sandbox restrictions and cause a denial of service or\npossibly execute arbitrary code. (CVE-2017-10074)\n\nIt was discovered that OpenJDK did not properly process parentheses in\nfunction signatures. An attacker could use this to specially construct an\nuntrusted Java application or applet that could escape sandbox\nrestrictions. (CVE-2017-10081)\n\nIt was discovered that the ThreadPoolExecutor class in OpenJDK did not\nproperly perform access control checks when cleaning up threads. An\nattacker could use this to specially construct an untrusted Java\napplication or applet that could escape sandbox restrictions and possibly\nexecute arbitrary code. (CVE-2017-10087)\n\nIt was discovered that the ServiceRegistry implementation in OpenJDK did\nnot perform access control checks in certain situations. An attacker could\nuse this to specially construct an untrusted Java application or applet\nthat escaped sandbox restrictions. (CVE-2017-10089)\n\nIt was discovered that the channel groups implementation in OpenJDK did not\nproperly perform access control checks in some situations. An attacker\ncould use this to specially construct an untrusted Java application or\napplet that could escape sandbox restrictions. (CVE-2017-10090)\n\nIt was discovered that the DTM exception handling code in the JAXP\ncomponent of OpenJDK did not properly perform access control checks. An\nattacker could use this to specially construct an untrusted Java\napplication or applet that could escape sandbox restrictions.\n(CVE-2017-10096)\n\nIt was discovered that the JAXP component of OpenJDK incorrectly granted\naccess to some internal resolvers. An attacker could use this to specially\nconstruct an untrusted Java application or applet that could escape sandbox\nrestrictions. (CVE-2017-10101)\n\nIt was discovered that the Distributed Garbage Collector (DGC) in OpenJDK\ndid not properly track references in some situations. A remote attacker\ncould possibly use this to execute arbitrary code. (CVE-2017-10102)\n\nIt was discovered that the Activation ID implementation in the RMI\ncomponent of OpenJDK did not properly check access control permissions in\nsome situations. An attacker could use this to specially construct an\nuntrusted Java application or applet that could escape sandbox\nrestrictions. (CVE-2017-10107)\n\nIt was discovered that the BasicAttribute class in OpenJDK did not properly\nbound memory allocation when de-serializing objects. An attacker could use\nthis to cause a denial of service (memory consumption). (CVE-2017-10108)\n\nIt was discovered that the CodeSource class in OpenJDK did not properly\nbound memory allocations when de-serializing object instances. An attacker\ncould use this to cause a denial of service (memory consumption).\n(CVE-2017-10109)\n\nIt was discovered that the AWT ImageWatched class in OpenJDK did not\nproperly perform access control checks, An attacker could use this to\nspecially construct an untrusted Java application or applet that could\nescape sandbox restrictions (CVE-2017-10110)\n\nIt was discovered that a timing side-channel vulnerability existed in the\nDSA implementation in OpenJDK. An attacker could use this to expose\nsensitive information. (CVE-2017-10115)\n\nIt was discovered that the LDAP implementation in OpenJDK incorrectly\nfollowed references to non-LDAP URLs. An attacker could use this to\nspecially craft an LDAP referral URL that exposes sensitive information or\nbypass access restrictions. (CVE-2017-10116)\n\nIt was discovered that a timing side-channel vulnerability existed in the\nECDSA implementation in OpenJDK. An attacker could use this to expose\nsensitive information. (CVE-2017-10118)\n\nIlya Maykov discovered that a timing side-channel vulnerability existed in\nthe PKCS#8 implementation in OpenJDK. An attacker could use this to expose\nsensitive information. (CVE-2017-10135)\n\nIt was discovered that the Elliptic Curve (EC) implementation in OpenJDK\ndid not properly compute certain elliptic curve points. An attacker could\nuse this to expose sensitive information. (CVE-2017-10176)\n\nIt was discovered that OpenJDK did not properly perform access control\nchecks when handling Web Service Definition Language (WSDL) XML documents.\nAn attacker could use this to expose sensitive information.\n(CVE-2017-10243)\n","modified":"2026-02-10T04:41:11Z","published":"2017-08-18T05:46:08Z","related":["UBUNTU-CVE-2017-10053","UBUNTU-CVE-2017-10067","UBUNTU-CVE-2017-10074","UBUNTU-CVE-2017-10081","UBUNTU-CVE-2017-10087","UBUNTU-CVE-2017-10089","UBUNTU-CVE-2017-10090","UBUNTU-CVE-2017-10096","UBUNTU-CVE-2017-10101","UBUNTU-CVE-2017-10102","UBUNTU-CVE-2017-10107","UBUNTU-CVE-2017-10108","UBUNTU-CVE-2017-10109","UBUNTU-CVE-2017-10110","UBUNTU-CVE-2017-10115","UBUNTU-CVE-2017-10116","UBUNTU-CVE-2017-10118","UBUNTU-CVE-2017-10135","UBUNTU-CVE-2017-10176","UBUNTU-CVE-2017-10243"],"upstream":["CVE-2017-10053","CVE-2017-10067","CVE-2017-10074","CVE-2017-10081","CVE-2017-10087","CVE-2017-10089","CVE-2017-10090","CVE-2017-10096","CVE-2017-10101","CVE-2017-10102","CVE-2017-10107","CVE-2017-10108","CVE-2017-10109","CVE-2017-10110","CVE-2017-10115","CVE-2017-10116","CVE-2017-10118","CVE-2017-10135","CVE-2017-10176","CVE-2017-10243","UBUNTU-CVE-2017-10053","UBUNTU-CVE-2017-10067","UBUNTU-CVE-2017-10074","UBUNTU-CVE-2017-10081","UBUNTU-CVE-2017-10087","UBUNTU-CVE-2017-10089","UBUNTU-CVE-2017-10090","UBUNTU-CVE-2017-10096","UBUNTU-CVE-2017-10101","UBUNTU-CVE-2017-10102","UBUNTU-CVE-2017-10107","UBUNTU-CVE-2017-10108","UBUNTU-CVE-2017-10109","UBUNTU-CVE-2017-10110","UBUNTU-CVE-2017-10115","UBUNTU-CVE-2017-10116","UBUNTU-CVE-2017-10118","UBUNTU-CVE-2017-10135","UBUNTU-CVE-2017-10176","UBUNTU-CVE-2017-10243"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3396-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10053"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10067"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10081"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10087"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10089"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10090"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10096"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10101"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10102"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10107"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10108"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10109"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10110"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10115"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10116"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10118"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10135"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-10243"}],"affected":[{"package":{"name":"openjdk-7","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/openjdk-7@7u151-2.6.11-0ubuntu1.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7u151-2.6.11-0ubuntu1.14.04.1"}]}],"versions":["7u25-2.3.12-4ubuntu3","7u25-2.3.12-4ubuntu5","7u45-2.4.3-3ubuntu1","7u45-2.4.3-3ubuntu2","7u45-2.4.3-4ubuntu1","7u45-2.4.3-4ubuntu2","7u51-2.4.4-1ubuntu1","7u51-2.4.5-1ubuntu1","7u51-2.4.6~pre1-1ubuntu2","7u51-2.4.6-1ubuntu3","7u51-2.4.6-1ubuntu4","7u55-2.4.7-1ubuntu1","7u65-2.5.1-4ubuntu1~0.14.04.1","7u65-2.5.1-4ubuntu1~0.14.04.2","7u65-2.5.2-3~14.04","7u71-2.5.3-0ubuntu0.14.04.1","7u75-2.5.4-1~trusty1","7u79-2.5.5-0ubuntu0.14.04.2","7u79-2.5.6-0ubuntu1.14.04.1","7u85-2.6.1-5ubuntu0.14.04.1","7u91-2.6.3-0ubuntu0.14.04.1","7u95-2.6.4-0ubuntu0.14.04.1","7u95-2.6.4-0ubuntu0.14.04.2","7u101-2.6.6-0ubuntu0.14.04.1","7u111-2.6.7-0ubuntu0.14.04.3","7u121-2.6.8-1ubuntu0.14.04.1","7u121-2.6.8-1ubuntu0.14.04.3","7u131-2.6.9-0ubuntu0.14.04.1","7u131-2.6.9-0ubuntu0.14.04.2"],"ecosystem_specific":{"binaries":[{"binary_name":"icedtea-7-jre-jamvm","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-demo","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-jdk","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-jre","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-jre-headless","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-jre-lib","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-jre-zero","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-source","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"},{"binary_name":"openjdk-7-tests","binary_version":"7u151-2.6.11-0ubuntu1.14.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3396-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10053"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10067"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10074"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10081"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10087"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10089"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10090"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10096"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10101"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10102"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10107"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10108"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10109"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10110"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10115"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10116"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10118"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10135"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-10176"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-10243"}]}}}],"schema_version":"1.7.3"}