CVE-2012-5373
Publication date 28 November 2012
Last updated 24 July 2024
Ubuntu priority
Oracle Java SE 7 and earlier, and OpenJDK 7 and earlier, computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm, a different vulnerability than CVE-2012-2739.
Status
Package | Ubuntu Release | Status |
---|---|---|
icedtea-web | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
openjdk-6 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
openjdk-6b18 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
openjdk-7 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
sun-java5 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
sun-java6 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
Notes
jdstrand
no 2.3 update as of 2013/12/20. 2.4/armhf needs to be fixed the MurmurHash3 was introduced in OpenJDK 7 7u9-2.3.3 and OpenJDK 6 6b24-1.11.5 as part of the fix for CVE-2012-2739. icedtea-web not affected (code not present) patches/security/20121016/7158800.patch introduced this (ie murmur3_32()) per comment #1 in https://bugzilla.redhat.com/show_bug.cgi?id=880705 SipHash-2-4 is not vulnerable
sbeattie
purported to be fixed in 7u40
Patch details
Package | Patch details |
---|---|
openjdk-7 |
References
Other references
- https://www.131002.net/data/talks/appsec12_slides.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=880705
- http://www.ocert.org/advisories/ocert-2012-001.html
- http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
- http://2012.appsec-forum.ch/conferences/#c17
- http://mail.openjdk.java.net/pipermail/core-libs-dev/2012-May/010238.html
- http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/d9564350faa6/patches/security/20121016/7158800.patch
- http://bugs.java.com/bugdatabase/view_bug.do?bug_id=8006593
- https://www.cve.org/CVERecord?id=CVE-2012-5373