Home

Description

An uninitialized stack read issue exists in Amazon Ion-C versions <v1.1.4 that may allow a threat actor to craft data and serialize it to Ion text in such a way that sensitive data in memory could be exposed through UTF-8 escape sequences. To mitigate this issue, users should upgrade to version v1.1.4.

PUBLISHED Reserved 2025-11-06 | Published 2025-11-07 | Updated 2025-11-07 | Assigner AMZN




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-125: Out-of-bounds Read

Product status

Default status
unaffected

1.1.4
unaffected

References

aws.amazon.com/security/security-bulletins/AWS-2025-027/ vendor-advisory

github.com/amazon-ion/ion-c/releases/tag/v1.1.4 patch

github.com/.../ion-c/security/advisories/GHSA-7mgf-6x73-5h7r vendor-advisory

cve.org (CVE-2025-12829)

nvd.nist.gov (CVE-2025-12829)

Download JSON