CVE-2012-0839

Publication date 8 February 2012

Last updated 24 July 2024


Ubuntu priority

OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Read the notes from the security team

Status

Package Ubuntu Release Status
ocaml 17.04 zesty
Not affected
16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
15.10 wily
Not affected
15.04 vivid Ignored end of life
14.10 utopic Ignored end of life
14.04 LTS trusty
Not affected
13.10 saucy Ignored end of life
13.04 raring Ignored end of life
12.10 quantal Ignored end of life
12.04 LTS precise Ignored end of life
11.10 oneiric Ignored end of life
11.04 natty Ignored end of life
10.10 maverick Ignored end of life
10.04 LTS lucid Ignored end of life
8.04 LTS hardy Ignored end of life

Notes


mdeslaur

New randomization turned off by default and must be specifically turned on by application. See upstream bug report. Downgrading severity to low, since upstream won't change default behaviour.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
ocaml