First published: Tue Aug 13 2024(Updated: )
Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Ion for Java | <1.10.5 | |
Amazon Ion for Java | <1.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2304311 is classified as a potential denial-of-service vulnerability affecting earlier versions of Amazon Ion.
To mitigate REDHAT-BUG-2304311, update to Amazon Ion version 1.10.5 or later.
REDHAT-BUG-2304311 affects Amazon Ion and ion-java prior to version 1.10.5.
REDHAT-BUG-2304311 is a denial-of-service vulnerability related to deserialization issues in Amazon Ion.
REDHAT-BUG-2304311 was reported due to issues found in the implementation prior to the release of version 1.10.5.