UniValue::read() in UniValue before 1.0.5 allow attackers to cause a denial of service (the class internal data reaches an inconsistent state) via input data that triggers an error.
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Univalue | Bloq | * | 1.0.5 (excluding) |
Libunivalue | Ubuntu | bionic | * |
Libunivalue | Ubuntu | eoan | * |
Libunivalue | Ubuntu | groovy | * |
Libunivalue | Ubuntu | hirsute | * |
Libunivalue | Ubuntu | impish | * |
Libunivalue | Ubuntu | kinetic | * |
Libunivalue | Ubuntu | lunar | * |
Libunivalue | Ubuntu | mantic | * |
Libunivalue | Ubuntu | trusty | * |