CVE-2012-0839
Publication date 8 February 2012
Last updated 24 July 2024
Ubuntu priority
OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Status
Package | Ubuntu Release | Status |
---|---|---|
ocaml | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
Notes
mdeslaur
New randomization turned off by default and must be specifically turned on by application. See upstream bug report. Downgrading severity to low, since upstream won't change default behaviour.
Patch details
Package | Patch details |
---|---|
ocaml |