A vulnerability has been found and corrected in ASF APR: tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table (CVE-2012-0840). APR has been upgraded to the latest version (1.4.6) which holds many improvements over the previous versions and is not vulnerable to this issue. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0840 http://www.apache.org/dist/apr/CHANGES-APR-1.4
CVE-2012-0840 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840): tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
dev-libs/apr-1.4.6 is now in gentoo-x86.
Duplicate of bug #399089. APR project says that there is no security vulnerability: http://www.mail-archive.com/dev%40apr.apache.org/msg24609.html
*** This bug has been marked as a duplicate of bug 399089 ***