vulnerability
Ubuntu: (CVE-2021-41119): haskell-aeson vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Apr 13, 2022 | Jun 26, 2025 | Aug 18, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Apr 13, 2022
Added
Jun 26, 2025
Modified
Aug 18, 2025
Description
Wire-server is the system server for the wire back-end services. Releases prior to v2022-03-01 are subject to a denial of service attack via a crafted object causing a hash collision. This collision causes the server to spend at least quadratic time parsing it which can lead to a denial of service for a heavily used server. The issue has been fixed in wire-server 2022-03-01 and is already deployed on all Wire managed services. On premise instances of wire-server need to be updated to 2022-03-01, so that their backends are no longer affected. There are no known workarounds for this issue.
Solution
no-fix-ubuntu-package
References
- CVE-2021-41119
- https://attackerkb.com/topics/CVE-2021-41119
- CWE-400
- URL-https://cs-syd.eu/posts/2021-09-11-json-vulnerability
- URL-https://github.com/haskell/aeson/commit/582a844d8028f62e409048a4caae187b27e8e697
- URL-https://github.com/haskell/aeson/issues/864
- URL-https://github.com/wireapp/wire-server/security/advisories/GHSA-phxv-pffh-fq2r
- URL-https://hackage.haskell.org/package/aeson-2.0.1.0
- URL-https://www.cve.org/CVERecord?id=CVE-2021-41119
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.