Integer Overflow or Wraparound The advisory has been revoked - it doesn't affect any version of package org.threeten:threetenbp Open this link in a new tab
Threat Intelligence
EPSS
0.05% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGTHREETEN-6591891
- published 9 Apr 2024
- disclosed 8 Apr 2024
- credit Unknown
Introduced: 8 Apr 2024
New CVE-2024-23082 Open this link in a new tabAmendment
This was deemed not a vulnerability.
Overview
Affected versions of this package are vulnerable to Integer Overflow or Wraparound in the org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition)
method, when the string is empty, the parameter index is 10, and the errorIndex
is 10.
Note:
After further investigations, this was found to not be a security issue.