Description
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Remediation
References
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50083
https://github.com/FasterXML/jackson-dataformats-text/blob/2.16/release-notes/VERSION-2.x
https://github.com/FasterXML/jackson-dataformats-text/pull/398
Related Vulnerabilities
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15on
CVE-2016-10537 Vulnerability in npm package backbone
CVE-2022-4361 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2020-28272 Vulnerability in npm package keyget
CVE-2023-31419 Vulnerability in maven package org.elasticsearch:elasticsearch