Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🔐 CVE-2024-21634: pkg:maven/software.amazon.ion/ion-java@1.0.2 #46

Closed
github-actions bot opened this issue Jan 17, 2024 · 1 comment · Fixed by #48
Closed

🔐 CVE-2024-21634: pkg:maven/software.amazon.ion/ion-java@1.0.2 #46

github-actions bot opened this issue Jan 17, 2024 · 1 comment · Fixed by #48
Assignees
Labels
security Security related change

Comments

@github-actions
Copy link

Summary

Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in ion-java for applications that use ion-java to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the IonValue model and then invoke certain IonValue methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the IonValue model, results in a StackOverflowError originating from the ion-java library. The patch is included in ion-java 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.

CVE: CVE-2024-21634
CWE: CWE-770

References

@kaklakariada
Copy link
Contributor

This was fixed in #47, issue number in changelog is fixed in #48

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Security related change
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant