Source: libjettison-java Version: 1.4.1-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libjettison-java. It is fixed upstream in 1.5.1. CVE-2022-40149[0]: | Those using Jettison to parse untrusted XML or JSON data may be | vulnerable to Denial of Service attacks (DOS). If the parser is | running on user supplied input, an attacker may supply content that | causes the parser to crash by stackoverflow. This effect may support a | denial of service attack. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-40149 https://www.cve.org/CVERecord?id=CVE-2022-40149 [1] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538 [2] https://github.com/jettison-json/jettison/issues/45 [3] https://github.com/jettison-json/jettison/commit/395f8625bcf688743872c8e7f59360d372e77811 Regards, Salvatore