The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327 | third party advisory |
https://github.com/google/gson/pull/1991 | third party advisory patch |
https://github.com/google/gson/pull/1991/commits | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2022/05/msg00015.html | third party advisory mailing list |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220901-0009/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00009.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5227 | third party advisory vendor advisory |