Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/software.amazon.ion/ion-java@None
purl pkg:maven/software.amazon.ion/ion-java@None
Tags Ghost
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-z6hm-cxw5-u3as
Aliases:
CVE-2024-21634
GHSA-264p-99wq-f4j6
Ion Java StackOverflow vulnerability ### Impact A potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to: * Deserialize Ion text encoded data, or * Deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. Impacted versions: <1.10.5 ### Patches The patch is included in `ion-java` >= 1.10.5. ### Workarounds Do not load data which originated from an untrusted source or that could have been tampered with. **Only load data you trust.** ---- If you have any questions or comments about this advisory, we ask that you contact AWS/Amazon Security via our vulnerability reporting page [1] or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue. [1] https://aws.amazon.com/security/vulnerability-reporting There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:52:21.795156+00:00 GitLab Importer Affected by VCID-z6hm-cxw5-u3as https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/software.amazon.ion/ion-java/CVE-2024-21634.yml 38.0.0