CVE-2013-6371

NameCVE-2013-6371
DescriptionThe hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs744008

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
json-c (PTS)buster, buster (security)0.12.1+ds-2+deb10u1fixed
bullseye (security), bullseye0.15-2+deb11u1fixed
bookworm0.16-2fixed
sid, trixie0.17-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
json-csource(unstable)0.11-4744008

Notes

[wheezy] - json-c <no-dsa> (Minor issue)
[squeeze] - json-c <no-dsa> (Minor issue)
https://github.com/json-c/json-c/commit/64e36901a0614bf64a19bc3396469c66dcd0b015

Search for package or bug name: Reporting problems