Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-z6hm-cxw5-u3as
Summary
Ion Java StackOverflow vulnerability
### Impact

A potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to:

* Deserialize Ion text encoded data, or
* Deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation.

An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library.

Impacted versions: <1.10.5

### Patches

The patch is included in `ion-java` >= 1.10.5.

### Workarounds

Do not load data which originated from an untrusted source or that could have been tampered with. **Only load data you trust.**

----

If you have any questions or comments about this advisory, we ask that you contact AWS/Amazon Security via our vulnerability reporting page [1] or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.

[1] https://aws.amazon.com/security/vulnerability-reporting
Aliases
0
alias CVE-2024-21634
1
alias GHSA-264p-99wq-f4j6
Fixed_packages
0
url pkg:maven/com.amazon.ion/ion-java@1.10.5
purl pkg:maven/com.amazon.ion/ion-java@1.10.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.10.5
Affected_packages
0
url pkg:maven/com.amazon.ion/ion-java@1.4.0
purl pkg:maven/com.amazon.ion/ion-java@1.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.4.0
1
url pkg:maven/com.amazon.ion/ion-java@1.5.0
purl pkg:maven/com.amazon.ion/ion-java@1.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.5.0
2
url pkg:maven/com.amazon.ion/ion-java@1.5.1
purl pkg:maven/com.amazon.ion/ion-java@1.5.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.5.1
3
url pkg:maven/com.amazon.ion/ion-java@1.6.0
purl pkg:maven/com.amazon.ion/ion-java@1.6.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.6.0
4
url pkg:maven/com.amazon.ion/ion-java@1.6.1
purl pkg:maven/com.amazon.ion/ion-java@1.6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.6.1
5
url pkg:maven/com.amazon.ion/ion-java@1.7.0
purl pkg:maven/com.amazon.ion/ion-java@1.7.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.7.0
6
url pkg:maven/com.amazon.ion/ion-java@1.7.1
purl pkg:maven/com.amazon.ion/ion-java@1.7.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.7.1
7
url pkg:maven/com.amazon.ion/ion-java@1.8.0
purl pkg:maven/com.amazon.ion/ion-java@1.8.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.8.0
8
url pkg:maven/com.amazon.ion/ion-java@1.8.1
purl pkg:maven/com.amazon.ion/ion-java@1.8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.8.1
9
url pkg:maven/com.amazon.ion/ion-java@1.8.2
purl pkg:maven/com.amazon.ion/ion-java@1.8.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.8.2
10
url pkg:maven/com.amazon.ion/ion-java@1.8.3
purl pkg:maven/com.amazon.ion/ion-java@1.8.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.8.3
11
url pkg:maven/com.amazon.ion/ion-java@1.9.0
purl pkg:maven/com.amazon.ion/ion-java@1.9.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.9.0
12
url pkg:maven/com.amazon.ion/ion-java@1.9.1
purl pkg:maven/com.amazon.ion/ion-java@1.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.9.1
13
url pkg:maven/com.amazon.ion/ion-java@1.9.2
purl pkg:maven/com.amazon.ion/ion-java@1.9.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.9.2
14
url pkg:maven/com.amazon.ion/ion-java@1.9.3
purl pkg:maven/com.amazon.ion/ion-java@1.9.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.9.3
15
url pkg:maven/com.amazon.ion/ion-java@1.9.4
purl pkg:maven/com.amazon.ion/ion-java@1.9.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.9.4
16
url pkg:maven/com.amazon.ion/ion-java@1.9.5
purl pkg:maven/com.amazon.ion/ion-java@1.9.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.9.5
17
url pkg:maven/com.amazon.ion/ion-java@1.9.6
purl pkg:maven/com.amazon.ion/ion-java@1.9.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.9.6
18
url pkg:maven/com.amazon.ion/ion-java@1.10.0
purl pkg:maven/com.amazon.ion/ion-java@1.10.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.10.0
19
url pkg:maven/com.amazon.ion/ion-java@1.10.1
purl pkg:maven/com.amazon.ion/ion-java@1.10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.10.1
20
url pkg:maven/com.amazon.ion/ion-java@1.10.2
purl pkg:maven/com.amazon.ion/ion-java@1.10.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.10.2
21
url pkg:maven/com.amazon.ion/ion-java@1.10.3
purl pkg:maven/com.amazon.ion/ion-java@1.10.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.10.3
22
url pkg:maven/com.amazon.ion/ion-java@1.10.4
purl pkg:maven/com.amazon.ion/ion-java@1.10.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/com.amazon.ion/ion-java@1.10.4
23
url pkg:maven/software.amazon.ion/ion-java@None
purl pkg:maven/software.amazon.ion/ion-java@None
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/software.amazon.ion/ion-java@None
24
url pkg:rpm/redhat/eap8-amazon-ion-java@1.11.9-2.redhat_00001.1?arch=el8eap
purl pkg:rpm/redhat/eap8-amazon-ion-java@1.11.9-2.redhat_00001.1?arch=el8eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-amazon-ion-java@1.11.9-2.redhat_00001.1%3Farch=el8eap
25
url pkg:rpm/redhat/eap8-amazon-ion-java@1.11.9-2.redhat_00001.1?arch=el9eap
purl pkg:rpm/redhat/eap8-amazon-ion-java@1.11.9-2.redhat_00001.1?arch=el9eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-amazon-ion-java@1.11.9-2.redhat_00001.1%3Farch=el9eap
26
url pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.1-2.GA_redhat_00002.1?arch=el9eap
purl pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.1-2.GA_redhat_00002.1?arch=el9eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.1-2.GA_redhat_00002.1%3Farch=el9eap
27
url pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.1-2.GA_redhat_00002.1?arch=el8eap
purl pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.1-2.GA_redhat_00002.1?arch=el8eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-eap-product-conf-parent@800.3.1-2.GA_redhat_00002.1%3Farch=el8eap
28
url pkg:rpm/redhat/eap8-undertow@2.3.14-2.SP2_redhat_00001.1?arch=el8eap
purl pkg:rpm/redhat/eap8-undertow@2.3.14-2.SP2_redhat_00001.1?arch=el8eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-undertow@2.3.14-2.SP2_redhat_00001.1%3Farch=el8eap
29
url pkg:rpm/redhat/eap8-undertow@2.3.14-2.SP2_redhat_00001.1?arch=el9eap
purl pkg:rpm/redhat/eap8-undertow@2.3.14-2.SP2_redhat_00001.1?arch=el9eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-undertow@2.3.14-2.SP2_redhat_00001.1%3Farch=el9eap
30
url pkg:rpm/redhat/eap8-wildfly@8.0.3-13.GA_redhat_00007.1?arch=el9eap
purl pkg:rpm/redhat/eap8-wildfly@8.0.3-13.GA_redhat_00007.1?arch=el9eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-wildfly@8.0.3-13.GA_redhat_00007.1%3Farch=el9eap
31
url pkg:rpm/redhat/eap8-wildfly@8.0.3-13.GA_redhat_00007.1?arch=el8eap
purl pkg:rpm/redhat/eap8-wildfly@8.0.3-13.GA_redhat_00007.1?arch=el8eap
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xme8-usmd-vqg3
1
vulnerability VCID-z6hm-cxw5-u3as
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap8-wildfly@8.0.3-13.GA_redhat_00007.1%3Farch=el8eap
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21634.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21634
reference_id
reference_type
scores
0
value 0.00458
scoring_system epss
scoring_elements 0.64034
published_at 2026-04-16T12:55:00Z
1
value 0.00458
scoring_system epss
scoring_elements 0.63998
published_at 2026-04-13T12:55:00Z
2
value 0.00458
scoring_system epss
scoring_elements 0.64028
published_at 2026-04-12T12:55:00Z
3
value 0.00458
scoring_system epss
scoring_elements 0.64042
published_at 2026-04-11T12:55:00Z
4
value 0.00458
scoring_system epss
scoring_elements 0.6403
published_at 2026-04-09T12:55:00Z
5
value 0.00458
scoring_system epss
scoring_elements 0.64013
published_at 2026-04-08T12:55:00Z
6
value 0.00458
scoring_system epss
scoring_elements 0.63962
published_at 2026-04-07T12:55:00Z
7
value 0.00458
scoring_system epss
scoring_elements 0.63975
published_at 2026-04-02T12:55:00Z
8
value 0.00458
scoring_system epss
scoring_elements 0.64003
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21634
2
reference_url https://github.com/amazon-ion/ion-java
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/amazon-ion/ion-java
3
reference_url https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-30T20:22:58Z/
url https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-21634
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-21634
5
reference_url https://security.netapp.com/advisory/ntap-20241108-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241108-0002
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2304311
reference_id 2304311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2304311
7
reference_url https://github.com/advisories/GHSA-264p-99wq-f4j6
reference_id GHSA-264p-99wq-f4j6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-264p-99wq-f4j6
Weaknesses
0
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-z6hm-cxw5-u3as