-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from unsafe JDK deserialization handling in NodeSerialization.java. The original implementation in readExternal() used 'new byte[len]' where 'len' came directly from untrusted ObjectInput. This allowed attackers to specify massive array sizes (up to Integer.MAX_VALUE), causing heap exhaustion. The patch adds a size check and chunked buffer management, confirming this was the vulnerable code path. The function's role in deserialization and direct resource allocation matches both the CWE-770 description and commit message explaining DoS mitigation.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.fasterxml.jackson.core:jackson-databind | maven | >= 2.10.0, < 2.12.6 | 2.12.6 |
| com.fasterxml.jackson.core:jackson-databind | maven | >= 2.13.0, < 2.13.1 | 2.13.1 |
Ongoing coverage of React2Shell