You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Issue**: Arbitrary Code Execution when reading Avro Data
9
+
-**Status**: **RESOLVED** - Upgraded to avro 1.11.4
10
+
11
+
## Known CVE Vulnerabilities
12
+
13
+
### ⚠️ GHSA-72hv-8253-57qq - Jackson Core (HIGH) - NO FIX AVAILABLE YET
14
+
-**Affected Versions**: All versions including 2.19.0
15
+
-**Issue**: Number Length Constraint Bypass in Async Parser Leads to Potential DoS
16
+
-**Status**: **MONITORING** - Using latest Jackson version (2.19.0), awaiting upstream fix
17
+
18
+
#### Description
19
+
The non-blocking (async) JSON parser in jackson-core bypasses the maxNumberLength constraint (default: 1000 characters) defined in StreamReadConstraints. This allows an attacker to send JSON with arbitrarily long numbers through the async parser API, leading to excessive memory allocation and potential CPU exhaustion.
20
+
21
+
#### Impact
22
+
- Memory Exhaustion: Unbounded allocation of memory in the TextBuffer
23
+
- CPU Exhaustion: O(n²) BigInteger parsing operations
0 commit comments