- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3373-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                   Bastien Roucariès
March 30, 2023                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : json-smart
Version        : 2.2-2+deb10u1
CVE ID         : CVE-2021-31684 CVE-2023-1370
Debian Bug     : 1033474

Multiple vulnerabilities were found in Json-smart library.
Json-smart is a performance focused, JSON processor lib written in Java.

CVE-2021-31684

    A vulnerability was discovered in the indexOf function of
    JSONParserByteArray in JSON Smart versions 1.3 and 2.4
    which causes a denial of service (DOS)
    via for instance a crafted web request.

CVE-2023-1370

    A stack overflow was found due to excessive recursion.
    When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code
    parses an array or an object respectively. It was discovered that the
    code does not have any limit to the nesting of such arrays or
    objects. Since the parsing of nested arrays and objects is done
    recursively, nesting too many of them can cause a stack exhaustion
    (stack overflow) and crash the software

For Debian 10 buster, these problems have been fixed in version
2.2-2+deb10u1.

We recommend that you upgrade your json-smart packages.

For the detailed security status of json-smart please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/json-smart

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3373-1: json-smart security update

March 31, 2023
Multiple vulnerabilities were found in Json-smart library

Summary

CVE-2021-31684

A vulnerability was discovered in the indexOf function of
JSONParserByteArray in JSON Smart versions 1.3 and 2.4
which causes a denial of service (DOS)
via for instance a crafted web request.

CVE-2023-1370

A stack overflow was found due to excessive recursion.
When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code
parses an array or an object respectively. It was discovered that the
code does not have any limit to the nesting of such arrays or
objects. Since the parsing of nested arrays and objects is done
recursively, nesting too many of them can cause a stack exhaustion
(stack overflow) and crash the software

For Debian 10 buster, these problems have been fixed in version
2.2-2+deb10u1.

We recommend that you upgrade your json-smart packages.

For the detailed security status of json-smart please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/json-smart

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : json-smart
Version : 2.2-2+deb10u1
CVE ID : CVE-2021-31684 CVE-2023-1370
Debian Bug : 1033474

Related News