* An adversary can crash binaries using the crypto::tink::JsonKeysetReader in tink-cc by providing an input containing many nested JSON objects. This may result in a stack overflow.
We recommend upgrading to version 2.1.3 or above
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-44044 | There exists a Denial of service vulnerability in Tink-cc in versions prior to 2.1.3. * An adversary can crash binaries using the crypto::tink::JsonKeysetReader in tink-cc by providing an input that is not an encoded JSON object, but still a valid encoded JSON element, for example a number or an array. This will crash as Tink just assumes any valid JSON input will contain an object. * An adversary can crash binaries using the crypto::tink::JsonKeysetReader in tink-cc by providing an input containing many nested JSON objects. This may result in a stack overflow. We recommend upgrading to version 2.1.3 or above |
| Link | Providers |
|---|---|
| https://github.com/tink-crypto/tink-cc/issues/4 |
|
Thu, 05 Jun 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google tink C\+\+ |
|
| CPEs | cpe:2.3:a:google:tink_c\+\+:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Google
Google tink C\+\+ |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-01T20:40:47.073Z
Reserved: 2024-05-02T11:15:28.604Z
Link: CVE-2024-4420
Updated: 2024-08-01T20:40:47.073Z
Status : Analyzed
Published: 2024-05-21T12:15:08.627
Modified: 2025-06-05T14:41:54.827
Link: CVE-2024-4420
No data.
OpenCVE Enrichment
No data.
EUVD