UBUNTU-CVE-2012-0039

Source
https://ubuntu.com/security/CVE-2012-0039
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-0039.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2012-0039
Upstream
Published
2012-01-14T17:55:00Z
Modified
2026-02-12T06:23:10.095009Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

GLib 2.31.8 and earlier, when the gstrhash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the gstrhash function is not a vulnerability in the library, because callers of ghashtablenew and ghashtablenew_full can specify an arbitrary hash function that is appropriate for the application.

References

Affected packages

Ubuntu:Pro:14.04:LTS / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/ubuntu/glib2.0@2.40.2-0ubuntu1.1+esm7?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.38.0-1ubuntu1
2.38.1-1
2.39.1-0ubuntu1
2.39.1-0ubuntu2
2.39.1-0ubuntu3
2.39.2-0ubuntu1
2.39.2-0ubuntu2
2.39.3-0ubuntu4
2.39.4-0ubuntu1
2.39.90-0ubuntu1
2.39.91-0ubuntu2
2.39.91-0ubuntu3
2.39.92-2
2.40.0-1
2.40.0-1ubuntu1
2.40.0-2
2.40.2-0ubuntu1
2.40.2-0ubuntu1.1
2.40.2-0ubuntu1.1+esm1
2.40.2-0ubuntu1.1+esm2
2.40.2-0ubuntu1.1+esm3
2.40.2-0ubuntu1.1+esm4
2.40.2-0ubuntu1.1+esm6
2.40.2-0ubuntu1.1+esm7

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-0"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-0-refdbg"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-bin"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-data"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-dev"
        },
        {
            "binary_version": "2.40.2-0ubuntu1.1+esm7",
            "binary_name": "libglib2.0-tests"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-0039.json"

Ubuntu:Pro:16.04:LTS / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/ubuntu/glib2.0@2.48.2-0ubuntu4.8+esm5?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.46.1-1
2.46.1-2
2.47.1-1
2.47.3-3
2.47.4-1
2.47.5-1
2.47.6-1
2.48.0-1ubuntu3
2.48.0-1ubuntu4
2.48.1-1~ubuntu16.04.1
2.48.2-0ubuntu1
2.48.2-0ubuntu3
2.48.2-0ubuntu4
2.48.2-0ubuntu4.1
2.48.2-0ubuntu4.2
2.48.2-0ubuntu4.3
2.48.2-0ubuntu4.4
2.48.2-0ubuntu4.5
2.48.2-0ubuntu4.6
2.48.2-0ubuntu4.7
2.48.2-0ubuntu4.8
2.48.2-0ubuntu4.8+esm1
2.48.2-0ubuntu4.8+esm3
2.48.2-0ubuntu4.8+esm4
2.48.2-0ubuntu4.8+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-0"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-0-refdbg"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-bin"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-data"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-dev"
        },
        {
            "binary_version": "2.48.2-0ubuntu4.8+esm5",
            "binary_name": "libglib2.0-tests"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-0039.json"

Ubuntu:Pro:18.04:LTS / glib2.0

Package

Name
glib2.0
Purl
pkg:deb/ubuntu/glib2.0@2.56.4-0ubuntu0.18.04.9+esm5?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.54.1-1ubuntu1
2.55.2-2ubuntu1
2.56.0-2ubuntu1
2.56.0-4ubuntu1
2.56.1-2ubuntu1
2.56.2-0ubuntu0.18.04.1
2.56.2-0ubuntu0.18.04.2
2.56.3-0ubuntu0.18.04.1
2.56.4-0ubuntu0.18.04.2
2.56.4-0ubuntu0.18.04.3
2.56.4-0ubuntu0.18.04.4
2.56.4-0ubuntu0.18.04.5
2.56.4-0ubuntu0.18.04.6
2.56.4-0ubuntu0.18.04.7
2.56.4-0ubuntu0.18.04.8
2.56.4-0ubuntu0.18.04.9
2.56.4-0ubuntu0.18.04.9+esm3
2.56.4-0ubuntu0.18.04.9+esm4
2.56.4-0ubuntu0.18.04.9+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-0"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-bin"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-data"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-dev"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-dev-bin"
        },
        {
            "binary_version": "2.56.4-0ubuntu0.18.04.9+esm5",
            "binary_name": "libglib2.0-tests"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-0039.json"