CVE-2012-0839
Published: 8 February 2012
OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Notes
Author | Note |
---|---|
mdeslaur | New randomization turned off by default and must be specifically turned on by application. See upstream bug report. Downgrading severity to low, since upstream won't change default behaviour. |
Priority
Status
Package | Release | Status |
---|---|---|
ocaml Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Not vulnerable
(4.01.0-3ubuntu3)
|
|
upstream |
Needs triage
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Not vulnerable
|
|
xenial |
Not vulnerable
|
|
yakkety |
Not vulnerable
|
|
zesty |
Not vulnerable
|
|
Patches: upstream: http://caml.inria.fr/cgi-bin/viewvc.cgi?view=revision&revision=12383 (4.00) upstream: http://caml.inria.fr/cgi-bin/viewvc.cgi?view=revision&revision=12384 (trunk) |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0839
- http://www.ocert.org/advisories/ocert-2011-003.html
- http://www.nruns.com/_downloads/advisory28122011.pdf
- http://www.mail-archive.com/caml-list@inria.fr/msg01477.html
- http://openwall.com/lists/oss-security/2012/02/07/1
- NVD
- Launchpad
- Debian