GLib 2.31.8 and earlier, when the gstrhash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the gstrhash function is not a vulnerability in the library, because callers of ghashtablenew and ghashtablenew_full can specify an arbitrary hash function that is appropriate for the application.
{
"binaries": [
{
"binary_name": "libglib2.0-0",
"binary_version": "2.40.2-0ubuntu1.1+esm7"
},
{
"binary_name": "libglib2.0-0-refdbg",
"binary_version": "2.40.2-0ubuntu1.1+esm7"
},
{
"binary_name": "libglib2.0-bin",
"binary_version": "2.40.2-0ubuntu1.1+esm7"
},
{
"binary_name": "libglib2.0-data",
"binary_version": "2.40.2-0ubuntu1.1+esm7"
},
{
"binary_name": "libglib2.0-tests",
"binary_version": "2.40.2-0ubuntu1.1+esm7"
}
]
}
{
"binaries": [
{
"binary_name": "libglib2.0-0",
"binary_version": "2.48.2-0ubuntu4.8+esm5"
},
{
"binary_name": "libglib2.0-0-refdbg",
"binary_version": "2.48.2-0ubuntu4.8+esm5"
},
{
"binary_name": "libglib2.0-bin",
"binary_version": "2.48.2-0ubuntu4.8+esm5"
},
{
"binary_name": "libglib2.0-data",
"binary_version": "2.48.2-0ubuntu4.8+esm5"
},
{
"binary_name": "libglib2.0-tests",
"binary_version": "2.48.2-0ubuntu4.8+esm5"
}
]
}
{
"binaries": [
{
"binary_name": "libglib2.0-0",
"binary_version": "2.56.4-0ubuntu0.18.04.9+esm5"
},
{
"binary_name": "libglib2.0-bin",
"binary_version": "2.56.4-0ubuntu0.18.04.9+esm5"
},
{
"binary_name": "libglib2.0-data",
"binary_version": "2.56.4-0ubuntu0.18.04.9+esm5"
},
{
"binary_name": "libglib2.0-dev-bin",
"binary_version": "2.56.4-0ubuntu0.18.04.9+esm5"
},
{
"binary_name": "libglib2.0-tests",
"binary_version": "2.56.4-0ubuntu0.18.04.9+esm5"
}
]
}