Source: msgpack-java
Version: 0.9.6-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for msgpack-java.

CVE-2026-21452[0]:
| MessagePack for Java is a serializer implementation for Java. A
| denial-of-service vulnerability exists in versions prior to 0.9.11
| when deserializing .msgpack files containing EXT32 objects with
| attacker-controlled payload lengths. While MessagePack-Java parses
| extension headers lazily, it later trusts the declared EXT payload
| length when materializing the extension data. When
| ExtensionValue.getData() is invoked, the library attempts to
| allocate a byte array of the declared length without enforcing any
| upper bound. A malicious .msgpack file of only a few bytes can
| therefore trigger unbounded heap allocation, resulting in JVM heap
| exhaustion, process termination, or service unavailability. This
| vulnerability is triggered during model loading / deserialization,
| making it a model format vulnerability suitable for remote
| exploitation. The vulnerability enables a remote denial-of-service
| attack against applications that deserialize untrusted .msgpack
| model files using MessagePack for Java. A specially crafted but
| syntactically valid .msgpack file containing an EXT32 object with an
| attacker-controlled, excessively large payload length can trigger
| unbounded memory allocation during deserialization. When the model
| file is loaded, the library trusts the declared length metadata and
| attempts to allocate a byte array of that size, leading to rapid
| heap exhaustion, excessive garbage collection, or immediate JVM
| termination with an OutOfMemoryError. The attack requires no
| malformed bytes, user interaction, or elevated privileges and can be
| exploited remotely in real-world environments such as model
| registries, inference services, CI/CD pipelines, and cloud-based
| model hosting platforms that accept or fetch .msgpack artifacts.
| Because the malicious file is extremely small yet valid, it can
| bypass basic validation and scanning mechanisms, resulting in
| complete service unavailability and potential cascading failures in
| production systems. Version 0.9.11 fixes the vulnerability.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-21452
    https://www.cve.org/CVERecord?id=CVE-2026-21452
[1] 
https://github.com/msgpack/msgpack-java/security/advisories/GHSA-cw39-r4h6-8j3x
[2] 
https://github.com/msgpack/msgpack-java/commit/daa2ea6b2f11f500e22c70a22f689f7a9debdeae

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to