CVE-2023-1370

NameCVE-2023-1370
Description[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3373-1
Debian Bugs1033474

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
json-smart (PTS)buster, bookworm, bullseye2.2-2vulnerable
buster (security)2.2-2+deb10u1fixed
sid, trixie2.2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
json-smartsourcebuster2.2-2+deb10u1DLA-3373-1
json-smartsource(unstable)2.2-31033474

Notes

[bookworm] - json-smart <no-dsa> (Minor issue)
[bullseye] - json-smart <no-dsa> (Minor issue)
https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/
https://github.com/netplex/json-smart-v2/commit/5b3205d051952d3100aa0db1535f6ba6226bd87a (2.4.9)

Search for package or bug name: Reporting problems