Oracle Java SE 7 and earlier, and OpenJDK 7 and earlier, computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm, a different vulnerability than CVE-2012-2739.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Jdk | Oracle | * | 1.7.0 (including) |
Jre | Oracle | * | 1.7.0 (including) |
Openjdk | Oracle | * | 1.7.0 (including) |
Icedtea-web | Ubuntu | upstream | * |
Openjdk-6 | Ubuntu | hardy | * |
Openjdk-6 | Ubuntu | lucid | * |
Openjdk-6 | Ubuntu | oneiric | * |
Openjdk-6 | Ubuntu | precise | * |
Openjdk-6 | Ubuntu | quantal | * |
Openjdk-6 | Ubuntu | raring | * |
Openjdk-6 | Ubuntu | saucy | * |
Openjdk-6 | Ubuntu | trusty | * |
Openjdk-6 | Ubuntu | upstream | * |
Openjdk-6 | Ubuntu | utopic | * |
Openjdk-6 | Ubuntu | vivid | * |
Openjdk-6 | Ubuntu | wily | * |
Openjdk-6b18 | Ubuntu | lucid | * |
Openjdk-6b18 | Ubuntu | oneiric | * |
Openjdk-6b18 | Ubuntu | upstream | * |
Openjdk-7 | Ubuntu | oneiric | * |
Openjdk-7 | Ubuntu | precise | * |
Openjdk-7 | Ubuntu | quantal | * |
Openjdk-7 | Ubuntu | raring | * |
Openjdk-7 | Ubuntu | saucy | * |
Openjdk-7 | Ubuntu | upstream | * |
Openjdk-7 | Ubuntu | utopic | * |
Openjdk-7 | Ubuntu | vivid | * |
Sun-java5 | Ubuntu | hardy | * |
Sun-java5 | Ubuntu | upstream | * |
Sun-java6 | Ubuntu | hardy | * |
Sun-java6 | Ubuntu | upstream | * |