| Summary: | dev-java/sun-{jdk,jre-bin}, app-emul/emul-linux-x86-java, dev-java/oracle-{jdk,jre}-bin: Murmur hash function collisions (CVE-2012-5373) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | minor | CC: | java |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://bugzilla.redhat.com/show_bug.cgi?id=880705 | ||
| Whiteboard: | B3 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Agostino Sarubbo
2012-11-29 13:07:58 UTC
CVE-2012-5373 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5373): Oracle Java SE 7 and earlier, and OpenJDK 7 and earlier, computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm, a different vulnerability than CVE-2012-2739. dev-java/sun-{jdk,jre-bin} and app-emul/emul-linux-x86-java have gone. dev-java/oracle-{jdk,jre}-bin were updated beyond 7u7 ages ago. It's really too late to issue a GLSA report about it now.
|