Total vulnerabilities in the database
The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
Software | From | Fixed in |
---|---|---|
libexpat_project / libexpat | - | 2.1.0 |
python / python | 3.2.0 | 3.2.3 |
python / python | 3.1.0 | 3.1.5 |
python / python | 2.7.0 | 2.7.3 |
python / python | 2.6.0 | 2.6.8 |
debian / debian_linux | 7.0 | 7.0.x |
debian / debian_linux | 6.0 | 6.0.x |
canonical / ubuntu_linux | 11.04 | 11.04.x |
canonical / ubuntu_linux | 11.10 | 11.10.x |
canonical / ubuntu_linux | 8.04 | 8.04.x |
canonical / ubuntu_linux | 10.04 | 10.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
oracle / solaris | 11.3 | 11.3.x |
redhat / enterprise_linux_server | 5.0 | 5.0.x |
redhat / enterprise_linux_server_aus | 6.2 | 6.2.x |
redhat / enterprise_linux_workstation | 5.0 | 5.0.x |
redhat / enterprise_linux_desktop | 6.0 | 6.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
redhat / enterprise_linux_workstation | 6.0 | 6.0.x |
redhat / enterprise_linux_desktop | 5.0 | 5.0.x |
redhat / storage | 2.0 | 2.0.x |
redhat / enterprise_linux_eus | 6.2 | 6.2.x |