CVE-2023-1370

NameCVE-2023-1370
Description[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3373-1
Debian Bugs1033474

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
json-smart (PTS)stretch2.2-1vulnerable
buster (security), buster, buster (lts)2.2-2+deb10u1fixed
bullseye2.2-2+deb11u1fixed
bookworm2.2-2+deb12u1fixed
sid, trixie2.2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
json-smartsourcestretch(unfixed)end-of-life
json-smartsourcebuster2.2-2+deb10u1DLA-3373-1
json-smartsourcebullseye2.2-2+deb11u1
json-smartsourcebookworm2.2-2+deb12u1
json-smartsource(unstable)2.2-31033474

Notes

https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/
https://github.com/netplex/json-smart-v2/commit/5b3205d051952d3100aa0db1535f6ba6226bd87a (2.4.9)

Search for package or bug name: Reporting problems