UBUNTU-CVE-2020-14326

Source
https://ubuntu.com/security/CVE-2020-14326
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-14326.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2020-14326
Upstream
Published
2021-06-02T12:15:00Z
Modified
2025-10-10T14:59:59Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.

References

Affected packages

Ubuntu:25.10 / resteasy

Package

Name
resteasy
Purl
pkg:deb/ubuntu/resteasy@3.6.2-3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.6.2-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.6.2-3",
            "binary_name": "libresteasy-java"
        }
    ]
}