{"id":"USN-3824-1","summary":"openjdk-7 vulnerabilities","details":"It was discovered that the Security component of OpenJDK did not properly\nensure that manifest elements were signed before use. An attacker could\npossibly use this to specially construct an untrusted Java application or\napplet that could escape sandbox restrictions. (CVE-2018-3136)\n\nArtem Smotrakov discovered that the HTTP client redirection handler\nimplementation in OpenJDK did not clear potentially sensitive information\nin HTTP headers when following redirections to different hosts. An attacker\ncould use this to expose sensitive information. (CVE-2018-3139)\n\nIt was discovered that the Java Naming and Directory Interface (JNDI)\nimplementation in OpenJDK did not properly enforce restrictions specified\nby system properties in some situations. An attacker could potentially use\nthis to execute arbitrary code. (CVE-2018-3149)\n\nIt was discovered that the Hotspot component of OpenJDK did not properly\nperform access checks in certain cases when performing field link\nresolution. An attacker could use this to specially construct an untrusted\nJava application or applet that could escape sandbox restrictions.\n(CVE-2018-3169)\n\nFelix Dörre discovered that the Java Secure Socket Extension (JSSE)\nimplementation in OpenJDK did not ensure that the same endpoint\nidentification algorithm was used during TLS session resumption as during\ninitial session setup. An attacker could use this to expose sensitive\ninformation. (CVE-2018-3180)\n","modified":"2026-02-10T04:41:27Z","published":"2018-11-16T00:53:12Z","related":["UBUNTU-CVE-2018-3136","UBUNTU-CVE-2018-3139","UBUNTU-CVE-2018-3149","UBUNTU-CVE-2018-3169","UBUNTU-CVE-2018-3180"],"upstream":["CVE-2018-3136","CVE-2018-3139","CVE-2018-3149","CVE-2018-3169","CVE-2018-3180","UBUNTU-CVE-2018-3136","UBUNTU-CVE-2018-3139","UBUNTU-CVE-2018-3149","UBUNTU-CVE-2018-3169","UBUNTU-CVE-2018-3180"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3824-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3136"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3139"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3149"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3169"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3180"}],"affected":[{"package":{"name":"openjdk-7","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/openjdk-7@7u181-2.6.14-0ubuntu0.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7u181-2.6.14-0ubuntu0.3"}]}],"versions":["7u25-2.3.12-4ubuntu3","7u25-2.3.12-4ubuntu5","7u45-2.4.3-3ubuntu1","7u45-2.4.3-3ubuntu2","7u45-2.4.3-4ubuntu1","7u45-2.4.3-4ubuntu2","7u51-2.4.4-1ubuntu1","7u51-2.4.5-1ubuntu1","7u51-2.4.6~pre1-1ubuntu2","7u51-2.4.6-1ubuntu3","7u51-2.4.6-1ubuntu4","7u55-2.4.7-1ubuntu1","7u65-2.5.1-4ubuntu1~0.14.04.1","7u65-2.5.1-4ubuntu1~0.14.04.2","7u65-2.5.2-3~14.04","7u71-2.5.3-0ubuntu0.14.04.1","7u75-2.5.4-1~trusty1","7u79-2.5.5-0ubuntu0.14.04.2","7u79-2.5.6-0ubuntu1.14.04.1","7u85-2.6.1-5ubuntu0.14.04.1","7u91-2.6.3-0ubuntu0.14.04.1","7u95-2.6.4-0ubuntu0.14.04.1","7u95-2.6.4-0ubuntu0.14.04.2","7u101-2.6.6-0ubuntu0.14.04.1","7u111-2.6.7-0ubuntu0.14.04.3","7u121-2.6.8-1ubuntu0.14.04.1","7u121-2.6.8-1ubuntu0.14.04.3","7u131-2.6.9-0ubuntu0.14.04.1","7u131-2.6.9-0ubuntu0.14.04.2","7u151-2.6.11-0ubuntu1.14.04.1","7u151-2.6.11-2ubuntu0.14.04.1","7u171-2.6.13-0ubuntu0.14.04.2","7u181-2.6.14-0ubuntu0.1","7u181-2.6.14-0ubuntu0.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"icedtea-7-jre-jamvm"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-demo"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-jdk"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-jre"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-jre-headless"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-jre-lib"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-jre-zero"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-source"},{"binary_version":"7u181-2.6.14-0ubuntu0.3","binary_name":"openjdk-7-tests"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3824-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3136"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3139"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3149"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3169"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-3180"}]}}}],"schema_version":"1.7.3"}