First published: Tue Mar 12 2024(Updated: )
It was discovered that Gson incorrectly handled deserialization of untrusted input data. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libgoogle-gson-java | <2.8.8-1ubuntu0.1 | 2.8.8-1ubuntu0.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/libgoogle-gson-java | <2.8.5-3+deb10u1build0.20.04.1 | 2.8.5-3+deb10u1build0.20.04.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/libgoogle-gson-java | <2.8.5-3~18.04.1~esm1 | 2.8.5-3~18.04.1~esm1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libgoogle-gson-java | <2.4-1ubuntu0.1~esm1 | 2.4-1ubuntu0.1~esm1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6692-1 is classified as a potential denial of service vulnerability.
To fix USN-6692-1, upgrade to the patched versions of libgoogle-gson-java as specified in the advisory for your Ubuntu version.
USN-6692-1 affects Ubuntu 16.04, 18.04, 20.04, and 22.04 with specific versions of libgoogle-gson-java.
The impact of the vulnerability identified by USN-6692-1 could allow a remote attacker to cause a denial of service.
Yes, user intervention is required as the vulnerability can be triggered by opening specially crafted input files.