Name | CVE-2023-5072 |
Description | Denial of Service in JSON-Java versions up to and including 20230618. A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1053882, 1053883, 1053884 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
jenkins-json (PTS) | bullseye | 2.4-jenkins-3-6 | vulnerable |
| bookworm, sid, trixie | 2.4-jenkins-3-7 | vulnerable |
libjettison-java (PTS) | bullseye (security), bullseye | 1.5.3-1~deb11u1 | vulnerable |
| bookworm | 1.5.3-1 | vulnerable |
| sid, trixie | 1.5.4-1 | vulnerable |
libjson-java (PTS) | bookworm, bullseye, sid, trixie | 2.4-3.1 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - libjson-java <no-dsa> (Minor issue, revisit when fixed upstream)
[bullseye] - libjson-java <no-dsa> (Minor issue)
[buster] - libjson-java <no-dsa> (Minor issue)
[bookworm] - jenkins-json <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - jenkins-json <no-dsa> (Minor issue)
[buster] - jenkins-json <no-dsa> (Minor issue)
[bookworm] - libjettison-java <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - libjettison-java <no-dsa> (Minor issue)
[buster] - libjettison-java <no-dsa> (Minor issue)
https://github.com/stleary/JSON-java/issues/758
https://github.com/stleary/JSON-java/issues/771
https://github.com/stleary/JSON-java/pull/772/
https://github.com/stleary/JSON-java/commit/dbb113176b143b519ad0a50b033a9997cc2248fe (20231013)
https://github.com/stleary/JSON-java/commit/16967f322ee65c301b48fa79bb681e38896fd212 (20231013)
https://github.com/stleary/JSON-java/commit/661114c50dcfd53bb041aab66f14bb91e0a87c8a (20231013)