Oracle Java SE 7 and earlier, and OpenJDK 7 and earlier, computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash3 algorithm, a different vulnerability than CVE-2012-2739.
{
"binaries": [
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "icedtea-7-jre-jamvm"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-dbg"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-demo"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-doc"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-jdk"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-jre"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-jre-headless"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-jre-lib"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-jre-zero"
},
{
"binary_version": "7u51-2.4.6-1ubuntu4",
"binary_name": "openjdk-7-source"
}
],
"availability": "No subscription required"
}