Name | CVE-2012-0840 |
Description | tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 655435 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
apr (PTS) | jessie, jessie (lts) | 1.5.1-3+deb8u1 | fixed |
| stretch (security), stretch (lts), stretch | 1.5.2-5+deb9u1 | fixed |
| buster | 1.6.5-1 | fixed |
| bullseye (security), bullseye | 1.7.0-6+deb11u2 | fixed |
| bookworm | 1.7.2-3+deb12u1 | fixed |
| sid, trixie | 1.7.5-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
apr | source | (unstable) | 1.4.6-1 | low | | 655435 |
Notes
[squeeze] - apr <no-dsa> (exploitability in httpd extremely limited, not known to be exploitable in svn)
Commit http://mail-archives.apache.org/mod_mbox/apr-commits/201201.mbox/%3C20120115003715.071D423888FD@eris.apache.org%3E seems to cause regressions