OCaml 3.12.1 and previous versions computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
inria ocaml 3.01 |
||
inria ocaml 3.07 |
||
inria ocaml 3.04 |
||
inria ocaml |
||
inria ocaml 3.12 |
||
inria ocaml 3.02 |
||
inria ocaml 1.07 |
||
inria ocaml 3.10 |
||
inria ocaml 2.04 |
||
inria ocaml 3.08 |
||
inria ocaml 3.09 |
||
inria ocaml 2.02 |
||
inria ocaml 3.11 |
||
inria ocaml 3.05 |
||
inria ocaml 3.00 |
||
inria ocaml 3.06 |
||
inria ocaml 3.03 |
||
inria ocaml 2.99 |