The vulnerability is a memory leak within the C implementation of the ultrajson library, which can be triggered to cause a denial of service. The analysis of the fixing commit 4baeb950df780092bd3c89fc702a868e99a3a1d2 points to a specific function in the C source code. The file src/ujson/python/JSONtoObj.c was modified to fix the leak. The function Object_newIntegerFromString allocates a memory buffer to process large integers from a JSON string. The patch introduces a call to PyObject_Free() to release this buffer, which was previously not being done, causing memory to be leaked on each call with a large integer. The public Python APIs such as ujson.load(), ujson.loads(), and ujson.decode() are the entry points that use this vulnerable C function. Therefore, any service using these functions to parse untrusted JSON is susceptible to a denial-of-service attack by sending JSON payloads with large integer values.