{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"jettison security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for jettison is now available for openEuler-20.03-LTS-SP4.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Jettison is a collection of Java APIs (like STaX and DOM) which read and write JSON. This allows nearly transparent enablement of JSON based web services in services frameworks like CXF or XML serialization frameworks like XStream.\n\nSecurity Fix(es):\n\nThose using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.(CVE-2022-40149)\n\nThose using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.(CVE-2022-40150)\n\nA stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.(CVE-2022-45685)\n\nJettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.(CVE-2022-45693)\n\nAn infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.\n\n(CVE-2023-1436)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for jettison is now available for openEuler-20.03-LTS-SP4.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"jettison",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2023-1965",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1965"
			},
			{
				"summary":"CVE-2022-40149",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-40149&packageName=jettison"
			},
			{
				"summary":"CVE-2022-40150",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-40150&packageName=jettison"
			},
			{
				"summary":"CVE-2022-45685",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-45685&packageName=jettison"
			},
			{
				"summary":"CVE-2022-45693",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-45693&packageName=jettison"
			},
			{
				"summary":"CVE-2023-1436",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-1436&packageName=jettison"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45685"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436"
			},
			{
				"summary":"openEuler-SA-2023-1965 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2023/csaf-openeuler-sa-2023-1965.json"
			}
		],
		"title":"An update for jettison is now available for openEuler-20.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2023-12-22T14:28:42+08:00",
			"revision_history":[
				{
					"date":"2023-12-22T14:28:42+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T14:28:42+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T14:28:42+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T14:28:42+08:00",
			"id":"openEuler-SA-2023-1965",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"openEuler-20.03-LTS-SP4",
									"name":"openEuler-20.03-LTS-SP4"
								},
								"name":"openEuler-20.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"jettison-1.5.4-1.oe2003sp4.noarch.rpm",
									"name":"jettison-1.5.4-1.oe2003sp4.noarch.rpm"
								},
								"name":"jettison-1.5.4-1.oe2003sp4.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"jettison-javadoc-1.5.4-1.oe2003sp4.noarch.rpm",
									"name":"jettison-javadoc-1.5.4-1.oe2003sp4.noarch.rpm"
								},
								"name":"jettison-javadoc-1.5.4-1.oe2003sp4.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
									},
									"product_id":"jettison-1.5.4-1.oe2003sp4.src.rpm",
									"name":"jettison-1.5.4-1.oe2003sp4.src.rpm"
								},
								"name":"jettison-1.5.4-1.oe2003sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"jettison-1.5.4-1.oe2003sp4.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
					"name":"jettison-1.5.4-1.oe2003sp4.noarch as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"jettison-javadoc-1.5.4-1.oe2003sp4.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
					"name":"jettison-javadoc-1.5.4-1.oe2003sp4.noarch as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
				"product_reference":"jettison-1.5.4-1.oe2003sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src",
					"name":"jettison-1.5.4-1.oe2003sp4.src as a component of openEuler-20.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-40149",
			"notes":[
				{
					"text":"Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					],
					"details":"jettison security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1965"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-40149"
		},
		{
			"cve":"CVE-2022-40150",
			"notes":[
				{
					"text":"Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					],
					"details":"jettison security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1965"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-40150"
		},
		{
			"cve":"CVE-2022-45685",
			"notes":[
				{
					"text":"A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					],
					"details":"jettison security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1965"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-45685"
		},
		{
			"cve":"CVE-2022-45693",
			"notes":[
				{
					"text":"Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					],
					"details":"jettison security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1965"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-45693"
		},
		{
			"cve":"CVE-2023-1436",
			"notes":[
				{
					"text":"An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
					"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					],
					"details":"jettison security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1965"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-javadoc-1.5.4-1.oe2003sp4.noarch",
						"openEuler-20.03-LTS-SP4:jettison-1.5.4-1.oe2003sp4.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-1436"
		}
	]
}