Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 947204 (CVE-2023-1370)

Summary: <dev-java/json-smart-2.5.1: possible stack overflow
Product: Gentoo Security Reporter: Volkmar W. Pogatzki <gentoo>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: normal CC: java, proxy-maint, tharvik
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/
Whiteboard: B3 [stable?]
Package list:
Runtime testing required: ---

Description Volkmar W. Pogatzki 2024-12-30 08:08:10 UTC
[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
Comment 1 Hans de Graaff gentoo-dev Security 2025-01-17 10:52:12 UTC
As far as I can tell from the sparse information json-smart v1 does not look affected.

Upstream fix commit: https://github.com/netplex/json-smart-v2/commit/5b3205d051952d3100aa0db1535f6ba6226bd87a