Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 882910 - (CVE-2012-6051) CVE-2012-6051 firefox, thunderbird, xulrunner: Google CityHash hash function collisions (oCERT-2012-001)
CVE-2012-6051 firefox, thunderbird, xulrunner: Google CityHash hash function ...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20121123,repor...
: Security
Depends On:
Blocks: 882913
  Show dependency treegraph
 
Reported: 2012-12-03 05:41 EST by Jan Lieskovsky
Modified: 2015-07-31 02:55 EDT (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-12-06 01:43:12 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2012-12-03 05:41:19 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-6051 to the following vulnerability:

Google CityHash computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6051
[2] http://2012.appsec-forum.ch/conferences/#c17
[3] http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf
[4] http://code.google.com/p/cityhash/source/browse/trunk/NEWS
[5] https://www.131002.net/data/talks/appsec12_slides.pdf

oCERT advisory:
[6] http://www.ocert.org/advisories/ocert-2012-001.html
Comment 2 Huzaifa S. Sidhpurwala 2012-12-06 01:43:12 EST
Statement:

Not Vulnerable. This issue does not affect the versions of xulrunner, firefox and thunderbird as shipped with Red Hat Enterprise Linux 5 and 6.

Note You need to log in before you can comment on or make changes to this bug.