vulnerability
Red Hat JBoss EAP: CVE-2024-21634: Allocation of Resources Without Limits or Throttling
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Jan 3, 2024 | Sep 19, 2024 | Jul 2, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Jan 3, 2024
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.. A vulnerability was found in Amazon Ion, an implementation of Ion data notation. Ion-java may be affected by denial of service (DoS) due to issues while deserializing encoded data into IonValue. A maliciously crafted Ion data structure may be processed and cause a StackOverflowError, leaving the application in an unreliable state.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-770
- CVE-2024-21634
- https://attackerkb.com/topics/CVE-2024-21634
- URL-https://access.redhat.com/security/cve/CVE-2024-21634
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2304311
- URL-https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6
- URL-https://access.redhat.com/errata/RHSA-2024:7441
- URL-https://access.redhat.com/errata/RHSA-2024:7442
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.