Summary: | <dev-libs/apr-1.4.6 APR library hash value predictability DoS (CVE-2012-0840) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Michael Harrison <n0idx80> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | minor | CC: | apache-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0840 | ||
Whiteboard: | B3 [ebuild] | ||
Package list: | Runtime testing required: | --- |
Description
Michael Harrison
2012-02-15 00:09:08 UTC
CVE-2012-0840 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840): tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. dev-libs/apr-1.4.6 is now in gentoo-x86. Duplicate of bug #399089. APR project says that there is no security vulnerability: http://www.mail-archive.com/dev%40apr.apache.org/msg24609.html *** This bug has been marked as a duplicate of bug 399089 *** |