GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
This CVE is not in the KEV list.
Exploitation none
Automatable yes
Technical Impact partial
Affected Vendors & Products
Vendors | Products |
---|---|
Gnome |
|
Configuration 1 [-]
|
No data.
References
History
Tue, 21 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-21T18:29:23.297Z
Reserved: 2011-12-07T00:00:00Z
Link: CVE-2012-0039

Updated: 2024-08-06T18:09:17.181Z

Status : Modified
Published: 2012-01-14T17:55:01.257
Modified: 2025-01-21T19:15:09.533
Link: CVE-2012-0039
