Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Jansson | Jansson_project | * | 2.4 (including) |
Jansson | Jansson_project | 2.0 (including) | 2.0 (including) |
Jansson | Jansson_project | 2.0.1 (including) | 2.0.1 (including) |
Jansson | Jansson_project | 2.1 (including) | 2.1 (including) |
Jansson | Jansson_project | 2.2 (including) | 2.2 (including) |
Jansson | Jansson_project | 2.2.1 (including) | 2.2.1 (including) |
Jansson | Jansson_project | 2.3 (including) | 2.3 (including) |
Jansson | Jansson_project | 2.3.1 (including) | 2.3.1 (including) |
Jansson | Ubuntu | precise | * |
Jansson | Ubuntu | quantal | * |
Jansson | Ubuntu | saucy | * |
Jansson | Ubuntu | trusty | * |
Jansson | Ubuntu | upstream | * |