Bug 2213863 (CVE-2023-33546)

Summary: CVE-2023-33546 janino: DoS in expression evaluator.guess parameter name method
Product: [Other] Security Response Reporter: Chess Hazlett <chazlett>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adupliak, aileenc, alampare, asoldano, ataylor, bbaranow, bbuckingham, bcourt, bmaxwell, brian.stansberry, cdewolf, chazlett, darran.lofthouse, dkreling, dosoudil, ehelms, emingora, fjuma, fmongiar, gmalinko, ivassile, iweiss, janstey, jnethert, jpoth, jross, jscholz, jsherril, lgao, lpetrovi, lzap, mhulan, mnovotny, mosmerov, msochure, mstefank, msvehla, myarboro, nmoumoul, nwallace, orabin, pcreech, pdelbell, peholase, pjindal, pmackay, rchan, rguimara, rjohnson, rrajasek, rstancel, rsynek, saroy, smaestri, swoodman, tcunning, tom.jenkinson, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A denial of service vulnerability was found in the janino compiler. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2213870    
Bug Blocks: 2211761    

Description Chess Hazlett 2023-06-09 15:50:24 UTC
janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow.