Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published: 2014-03-20T18:00:00
Updated: 2024-08-06T17:39:01.595Z
Reserved: 2013-11-04T00:00:00
Link: CVE-2013-6401

No data.

Status : Deferred
Published: 2014-03-21T01:04:00.623
Modified: 2025-04-12T10:46:40.837
Link: CVE-2013-6401
