Package: json-smart / 2.2-2+deb11u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| json-smart | 2.2-2+deb11u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 01 bundle dependencies.patch | (download) |
json-smart/pom.xml |
2 2 + 0 - 0 ! |
set the version and the type of the accessors-smart dependency |
| 02 ignore failing tests.patch | (download) |
accessors-smart/src/test/java/net/minidev/asm/TestDateConvert.java |
12 6 + 6 - 0 ! |
ignore testdateconvert due to timezone dependent tests Bug: https://github.com/netplex/json-smart-v2/issues/29 |
| maven bundle plugin failok.patch | (download) |
accessors-smart/pom.xml |
1 1 + 0 - 0 ! |
maven bundle plugin failok Workaround for #868913. Bug-Debian: https://bugs.debian.org/868603 |
| 0004 CVE 2021 31684 Fix indexOf.patch | (download) |
json-smart/src/main/java/net/minidev/json/parser/JSONParserByteArray.java |
2 1 + 1 - 0 ! |
cve-2021-31684: fix indexof A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions 1.3 and 2.4 which causes a denial of service (DOS) via a crafted web request. |
| 0005 CVE 2023 1370 stack overflow due to excessive recurs.patch | (download) |
json-smart/src/main/java/net/minidev/json/parser/JSONParserBase.java |
17 16 + 1 - 0 ! |
cve-2023-1370: stack overflow due to excessive recursion
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
When reaching a [ or { character in the JSON input, the code
parses an array or an object respectively. It was discovered that the
code does not have any limit to the nesting of such arrays or
objects. Since the parsing of nested arrays and objects is done
recursively, nesting too many of them can cause a stack exhaustion
(stack overflow) and crash the software.
|
