DirectorySecurity Advisories
Sign In
Security Advisories

CGA-723m-w75j-48wv

Published

Last updated

https://images.chainguard.dev/security/CGA-723m-w75j-48wv
Package

jenkins-2.440

Latest Update
Fix not planned
Aliases
  • GHSA-hfq9-hggm-c56q

Severity

7.5

High

CVSS V3

Summary

XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream

Description

Impact

The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver.

Patches

XStream 1.4.21 detects the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead.

Workarounds

The only solution is to catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.

References

See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for CVE-2024-47072.

Credits

Alexis Challande of Trail Of Bits found and reported the issue to XStream and provided the required information to reproduce it.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images