{
  "threat_severity" : "Important",
  "public_date" : "2026-03-06T07:14:25Z",
  "bugzilla" : {
    "description" : "jackson-core: jackson-core: Denial of Service via excessive JSON nesting",
    "id" : "2445135",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2445135"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-1284",
  "details" : [ "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. From version 3.0.0 to before version 3.1.0, the UTF8DataInputJsonParser, which is used when parsing from a java.io.DataInput source, bypasses the maxNestingDepth constraint (default: 500) defined in StreamReadConstraints. A similar issue was found in ReaderBasedJsonParser. This allows a user to supply a JSON document with excessive nesting, which can cause a StackOverflowError when the structure is processed, leading to a Denial of Service (DoS). This issue has been patched in version 3.1.0.", "A flaw was found in jackson-core. A user could exploit this vulnerability by supplying a specially crafted JSON document with excessive nesting. This bypasses a security constraint designed to limit nesting depth, which can cause a system crash (StackOverflowError) when the document is processed. This ultimately leads to a Denial of Service (DoS) for the affected application." ],
  "package_state" : [ {
    "product_name" : "Red Hat Certificate System 10",
    "fix_state" : "Not affected",
    "package_name" : "redhat-pki:10/redhat-pki",
    "cpe" : "cpe:/a:redhat:certificate_system:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "dogtag-pki",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "pki-deps:10.6/jackson-core",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "jackson-core",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-29062\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-29062\nhttps://github.com/FasterXML/jackson-core/commit/8b25fd67f20583e75fb09564ce1eaab06cd5a902\nhttps://github.com/FasterXML/jackson-core/pull/1554\nhttps://github.com/FasterXML/jackson-core/security/advisories/GHSA-6v53-7c9g-w56r" ],
  "name" : "CVE-2026-29062",
  "csaw" : false
}