CVE-2012-0839
08.02.2012, 20:55
OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.Enginsight
Vendor | Product | Version |
---|---|---|
inria | ocaml | 𝑥 ≤ 3.12.1 |
inria | ocaml | 1.07 |
inria | ocaml | 2.02 |
inria | ocaml | 2.04 |
inria | ocaml | 2.99:alpha |
inria | ocaml | 3.00 |
inria | ocaml | 3.01 |
inria | ocaml | 3.02 |
inria | ocaml | 3.03:alpha |
inria | ocaml | 3.04 |
inria | ocaml | 3.05:beta |
inria | ocaml | 3.06 |
inria | ocaml | 3.07 |
inria | ocaml | 3.07:beta1 |
inria | ocaml | 3.07:beta2 |
inria | ocaml | 3.07:pl2 |
inria | ocaml | 3.08 |
inria | ocaml | 3.09 |
inria | ocaml | 3.10 |
inria | ocaml | 3.11 |
inria | ocaml | 3.12 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References