CVE-2012-0840
Published: February 10, 2012Last modified: November 10, 2023
Description
tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | apr | Not affected (1.7.2-r0) |
Stream | apr | Not affected (1.7.4-r0) |
References
- http://mail-archives.apache.org/mod_mbox/apr-commits/201201.mbox/%3C20120115003715.071D423888FD%40eris.apache.org%3E
- http://openwall.com/lists/oss-security/2012/02/08/3
- http://openwall.com/lists/oss-security/2012/02/09/1
- http://secunia.com/advisories/47862
- http://svn.apache.org/viewvc?rev=1231605&view=rev
- http://www.mail-archive.com/dev%40apr.apache.org/msg24439.html
- http://www.mail-archive.com/dev%40apr.apache.org/msg24472.html
- http://www.mail-archive.com/dev%40apr.apache.org/msg24473.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:019
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73096