Lucene search

K
debianDebianDEBIAN:DLA-3373-1:E9458
HistoryMar 31, 2023 - 8:03 a.m.

[SECURITY] [DLA 3373-1] json-smart security update

2023-03-3108:03:05
lists.debian.org
12
cve-2023-1370
stack overflow
debian
java
denial of service
cve-2021-31684
json-smart
debian 10 buster
security update

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.9 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.6%


Debian LTS Advisory DLA-3373-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
March 30, 2023 https://wiki.debian.org/LTS


Package : json-smart
Version : 2.2-2+deb10u1
CVE ID : CVE-2021-31684 CVE-2023-1370
Debian Bug : 1033474

Multiple vulnerabilities were found in Json-smart library.
Json-smart is a performance focused, JSON processor lib written in Java.

CVE-2021-31684

A vulnerability was discovered in the indexOf function of
JSONParserByteArray in JSON Smart versions 1.3 and 2.4
which causes a denial of service (DOS)
via for instance a crafted web request.

CVE-2023-1370

A stack overflow was found due to excessive recursion.
When reaching a â??[â?? or â??{â?? character in the JSON input, the code
parses an array or an object respectively. It was discovered that the
code does not have any limit to the nesting of such arrays or
objects. Since the parsing of nested arrays and objects is done
recursively, nesting too many of them can cause a stack exhaustion
(stack overflow) and crash the software

For Debian 10 buster, these problems have been fixed in version
2.2-2+deb10u1.

We recommend that you upgrade your json-smart packages.

For the detailed security status of json-smart please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/json-smart

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.9 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.6%