1
Candidate: CVE-2012-6051
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6051
5
https://www.131002.net/data/talks/appsec12_slides.pdf
6
http://code.google.com/p/cityhash/source/browse/trunk/NEWS
7
http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
8
http://2012.appsec-forum.ch/conferences/#c17
10
Google CityHash computes hash values without properly restricting the
11
ability to trigger hash collisions predictably, which allows
12
context-dependent attackers to cause a denial of service (CPU consumption)
13
via crafted input to an application that maintains a hash table, as
14
demonstrated by a universal multicollision attack.
23
upstream_cityhash: released (1.1)
26
oneiric_cityhash: ignored (reached end-of-life)
27
precise_cityhash: ignored (reached end-of-life)
28
precise/esm_cityhash: DNE (precise was needed)
29
quantal_cityhash: ignored (reached end-of-life)
30
raring_cityhash: ignored (reached end-of-life)
35
vivid/stable-phone-overlay_cityhash: DNE
36
vivid/ubuntu-core_cityhash: DNE