7.5
CWE
502 835
Advisory Published
Updated

GHSA-gm2p-wf5c-w3pj

First published: Mon Apr 21 2025(Updated: )

## Summary [Amazon.IonDotnet (ion-dotnet)](https://github.com/amazon-ion/ion-dotnet) is a .NET library with an implementation of the [Ion data serialization format](https://amazon-ion.github.io/ion-docs/). An issue exists in Amazon.IonDotnet and the RawBinaryReader class where, under certain conditions, an actor could trigger an infinite loop condition. ## Impact When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. **Impacted versions: <=1.3.0** ## Patches This issue has been addressed in Amazon.IonDotnet version [1.3.1](https://github.com/amazon-ion/ion-dotnet/releases/tag/v1.3.1). We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes. ## Workarounds There are no workarounds. Upgrade to version 1.3.1. ## References If you have any questions or comments about this advisory, contact AWS/Amazon Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue. ## Credit We would like to thank Josh Coleman from Symbotic for collaborating on this issue through the coordinated vulnerability disclosure process.

Affected SoftwareAffected VersionHow to fix
nuget/Amazon.IonDotnet<1.3.1
1.3.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of GHSA-gm2p-wf5c-w3pj?

    The severity of GHSA-gm2p-wf5c-w3pj is classified as moderate.

  • How do I fix GHSA-gm2p-wf5c-w3pj?

    To fix GHSA-gm2p-wf5c-w3pj, update the Amazon.IonDotnet package to version 1.3.1 or later.

  • What versions of Amazon.IonDotnet are affected by GHSA-gm2p-wf5c-w3pj?

    GHSA-gm2p-wf5c-w3pj affects all versions of Amazon.IonDotnet below 1.3.1.

  • What is Amazon.IonDotnet related to GHSA-gm2p-wf5c-w3pj?

    Amazon.IonDotnet is a .NET library that implements the Ion data serialization format and contains the vulnerability identified as GHSA-gm2p-wf5c-w3pj.

  • What impact does GHSA-gm2p-wf5c-w3pj have on applications?

    GHSA-gm2p-wf5c-w3pj can lead to potential data exposure vulnerabilities in applications using the affected version of Amazon.IonDotnet.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203