JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Jruby | Jruby | - (including) | - (including) |
Jruby | Ubuntu | lucid | * |
Jruby | Ubuntu | oneiric | * |
Jruby | Ubuntu | precise | * |
Jruby | Ubuntu | quantal | * |
Jruby | Ubuntu | raring | * |
Jruby | Ubuntu | saucy | * |
Jruby | Ubuntu | trusty | * |
Jruby | Ubuntu | upstream | * |
Jruby | Ubuntu | utopic | * |
Jruby | Ubuntu | vivid | * |
Jruby | Ubuntu | wily | * |
Jruby | Ubuntu | xenial | * |
Jruby | Ubuntu | yakkety | * |
Fuse ESB Enterprise 7.1.0 | RedHat | * | |
Red Hat JBoss SOA Platform 5.3 | RedHat | * |