{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2020-14326","title":"Title"},{"category":"description","text":"A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2020-14326","url":"https://www.suse.com/security/cve/CVE-2020-14326"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1174066 for CVE-2020-14326","url":"https://bugzilla.suse.com/1174066"}],"title":"SUSE CVE CVE-2020-14326","tracking":{"current_release_date":"2025-02-17T06:33:37Z","generator":{"date":"2023-02-15T03:57:50Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2020-14326","initial_release_date":"2023-02-15T03:57:50Z","revision_history":[{"date":"2023-02-15T03:57:50Z","number":"2","summary":"Current version"},{"date":"2025-01-01T05:34:18Z","number":"3","summary":"Current version"},{"date":"2025-02-15T06:12:50Z","number":"4","summary":"Current version"},{"date":"2025-02-17T06:33:37Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}