Back to bug 2221135

Who When What Removed Added
TEJ RATHI 2023-07-07 09:36:29 UTC Summary TRIAGE-CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale TRIAGE-CVE-2023-33008 johnzon: Prevent inefficient internal conversion from BigDecimal at large scale
TEJ RATHI 2023-07-07 09:38:00 UTC Summary TRIAGE-CVE-2023-33008 johnzon: Prevent inefficient internal conversion from BigDecimal at large scale TRIAGE-CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale
TEJ RATHI 2023-07-07 09:40:00 UTC CC aileenc, alampare, alazarot, anstephe, asoldano, avibelli, bbaranow, bgeorges, bmaxwell, brian.stansberry, cdewolf, clement.escoffier, cmoulliard, dandread, darran.lofthouse, dffrench, dhanak, dkreling, dosoudil, emingora, fjuma, fmongiar, gjospin, gmalinko, gsmet, gzaronik, hamadhan, hbraun, ibek, ikanello, ivassile, iweiss, janstey, jmartisk, jnethert, jpoth, jrokos, kverlaen, lbacciot, lgao, lthon, max.andersen, mnovotny, mosmerov, msochure, mstefank, msvehla, ngough, nwallace, pdelbell, peholase, pgallagh, pjindal, pmackay, probinso, rgodfrey, rguimara, rruss, rstancel, rsvoboda, sbiarozk, sdouglas, smaestri, tcunning, tom.jenkinson, tqvarnst, yfang
TEJ RATHI 2023-07-07 09:55:21 UTC Blocks 2221165
Patrick Del Bello 2023-07-31 20:34:11 UTC Doc Text Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20.


A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk.
Patrick Del Bello 2023-07-31 20:37:21 UTC Doc Text Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20.


A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk.
A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk.
Patrick Del Bello 2023-08-11 19:31:29 UTC Alias TRIAGE-CVE-2023-33008 CVE-2023-33008
Summary TRIAGE-CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale
Paige Jung 2023-08-11 20:19:21 UTC Doc Text A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk. A flaw was found in Apache Johnzon. This issue could allow an attacker to craft a specific JSON input that Johnzon will deserialize into a BigDecimal, which Johnzon may use to start converting large numbers, resulting in a denial of service.

Back to bug 2221135