CVE-2012-2739

NameCVE-2012-2739
DescriptionOracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build 12 and 8 before build 39, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openjdk-6 (PTS)wheezy, wheezy (security)6b38-1.13.10-1~deb7u1vulnerable
openjdk-7 (PTS)wheezy7u95-2.6.4-1~deb7u1vulnerable
wheezy (security)7u151-2.6.11-2~deb7u3vulnerable
jessie7u111-2.6.7-1~deb8u1vulnerable
jessie (security)7u151-2.6.11-2~deb8u1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openjdk-6source(unstable)(unfixed)unimportant
openjdk-7source(unstable)(unfixed)unimportant

Notes

Upstream disputes this and states it needs to be fixed in Java apps itself
http://mail.openjdk.java.net/pipermail/core-libs-dev/2012-May/010238.html
http://armoredbarista.blogspot.de/2012/02/investigating-hashdos-issue.html
http://www.openwall.com/lists/oss-security/2012/06/15/12
http://www.openwall.com/lists/oss-security/2012/06/17/1

Search for package or bug name: Reporting problems