Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mbW1xLWo3cHEtZjg1Y84AAd47
JRuby denial of service via Hash Collision
JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.
Permalink: https://github.com/advisories/GHSA-fmmq-j7pq-f85cJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mbW1xLWo3cHEtZjg1Y84AAd47
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 8 months ago
Identifiers: GHSA-fmmq-j7pq-f85c, CVE-2012-5370
References:
- https://nvd.nist.gov/vuln/detail/CVE-2012-5370
- https://bugzilla.redhat.com/show_bug.cgi?id=880671
- http://rhn.redhat.com/errata/RHSA-2013-0533.html
- https://github.com/jruby/jruby/commit/5e4aab28b26fd127112b76fabfac9a33b64caf77
- http://jruby.org/2012/12/03/jruby-1-7-1
- https://github.com/advisories/GHSA-fmmq-j7pq-f85c
Blast Radius: 1.0
Affected Packages
maven:org.jruby:jruby-parent
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: < 1.7.1
Fixed in: 1.7.1
All affected versions:
All unaffected versions: 1.7.5, 1.7.6, 1.7.7, 1.7.8, 1.7.9, 1.7.10, 1.7.11, 1.7.12, 1.7.13, 1.7.14, 1.7.15, 1.7.16, 1.7.17, 1.7.18, 1.7.19, 1.7.20, 1.7.21, 1.7.22, 1.7.23, 1.7.24, 1.7.25, 1.7.26, 1.7.27