Bug 1106388 (CVE-2014-0462) - CVE-2014-0462 OpenJDK: libjpeg: uninitialized memory read information leak (AWT, 8029760)
Summary: CVE-2014-0462 OpenJDK: libjpeg: uninitialized memory read information leak (A...
Status: CLOSED DUPLICATE of bug 1031734
Alias: CVE-2014-0462
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: 1082776
TreeView+ depends on / blocked
Reported: 2014-06-09 08:41 UTC by Tomas Hoger
Modified: 2019-09-29 13:18 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2014-06-09 09:07:20 UTC

Attachments (Terms of Use)

Description Tomas Hoger 2014-06-09 08:41:06 UTC
The CVE id CVE-2014-0462 was assigned to the following issue:

Unspecified vulnerability in OpenJDK 6 before 6b31 on Debian GNU/Linux and Ubuntu 12.04 LTS and 10.04 LTS has unknown impact and attack vectors, a different vulnerability than CVE-2014-2405.


Comment 1 Tomas Hoger 2014-06-09 09:04:36 UTC
This CVE id was assigned incorrectly as a duplicate of libjpeg CVE-2013-6629 (see bug 1031734) for a bundled copy of the libjpeg code used in the OpenJDK sources.  Incorrect assignment of the id was identified before the new releases were announced, so the id did not appear in those announcements.  The id was briefly used in IcedTea6 NEWS files and corrected upstream via the following commit:


The OpenJDK packages (java-1.6.0-openjdk and java-1.7.0-openjdk) as shipped with Red Hat Enterprise Linux do not use bundled libjpeg copy and rely on system packages, which were already corrected via RHSA-2013:1803 and RHSA-2013:1804.


This issue is a duplicate of the libjpeg CVE-2013-6629 issue. The versions of java-1.6.0-openjdk and java-1.7.0-openjdk as shipped with Red Hat Enterprise Linux 5 and 6 were not affected by this issue, as they do not use bundled libjpeg version.

Comment 2 Tomas Hoger 2014-06-09 09:07:20 UTC

*** This bug has been marked as a duplicate of bug 1031734 ***

Note You need to log in before you can comment on or make changes to this bug.