Vulnerability Description
Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amazon | Ion | < 1.10.5 |
Related Weaknesses (CWE)
References
- https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6Vendor Advisory
- https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6Vendor Advisory
- https://security.netapp.com/advisory/ntap-20241108-0002/
FAQ
What is CVE-2024-21634?
CVE-2024-21634 is a vulnerability with a CVSS score of 7.5 (HIGH). Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion ...
How severe is CVE-2024-21634?
CVE-2024-21634 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21634?
Check the references section above for vendor advisories and patch information. Affected products include: Amazon Ion.