Описание
Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 2.6-1 |
| bionic | not-affected | 2.6-1 |
| devel | not-affected | 2.6-1 |
| esm-infra-legacy/trusty | released | 2.5-2ubuntu0.1 |
| esm-infra/bionic | not-affected | 2.6-1 |
| esm-infra/xenial | not-affected | 2.6-1 |
| lucid | DNE | |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
Jansson, possibly 2.4 and earlier, does not restrict the ability to tr ...
Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
EPSS
5 Medium
CVSS2