jackson-databind is vulnerable to Denial Of Service (DoS). The vulnerability exists in _deserializeFromArray
function in BeanDeserializer.java
due to resource exhaustion when processing a deeply nested array which allows an attacker to cause an application crash via a malicious input.
bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490
github.com/advisories/GHSA-rgv9-q543-rqg4
github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88
github.com/FasterXML/jackson-databind/issues/3582
lists.debian.org/debian-lts-announce/2022/11/msg00035.html
security.gentoo.org/glsa/202210-21
security.netapp.com/advisory/ntap-20221118-0008/
www.debian.org/security/2022/dsa-5283