Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-0839

Published: 8 February 2012

OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Notes

AuthorNote
mdeslaur
New randomization turned off by default and must be specifically
turned on by application. See upstream bug report.
Downgrading severity to low, since upstream won't change default
behaviour.

Priority

Low

Status

Package Release Status
ocaml
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid Ignored
(end of life)
maverick Ignored
(end of life)
natty Ignored
(end of life)
oneiric Ignored
(end of life)
precise Ignored
(end of life)
quantal Ignored
(end of life)
raring Ignored
(end of life)
saucy Ignored
(end of life)
trusty Not vulnerable
(4.01.0-3ubuntu3)
upstream Needs triage

utopic Ignored
(end of life)
vivid Ignored
(end of life)
wily Not vulnerable

xenial Not vulnerable

yakkety Not vulnerable

zesty Not vulnerable

Patches:
upstream: http://caml.inria.fr/cgi-bin/viewvc.cgi?view=revision&revision=12383 (4.00)
upstream: http://caml.inria.fr/cgi-bin/viewvc.cgi?view=revision&revision=12384 (trunk)