DirectorySecurity Advisories
Sign In
Security Advisories

CGA-cc2c-9vqh-97j8

Published

Last updated

https://images.chainguard.dev/security/CGA-cc2c-9vqh-97j8
Package

jenkins-2.479

Latest Update
Fixed
Fixed Version

2.479.1-r1

Aliases
  • CVE-2024-47072
  • GHSA-hfq9-hggm-c56q

Severity

7.5

High

CVSS V3

Summary

XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream

Description

Impact

The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver.

Patches

XStream 1.4.21 detects the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead.

Workarounds

The only solution is to catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.

References

See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for CVE-2024-47072.

Credits

Alexis Challande of Trail Of Bits found and reported the issue to XStream and provided the required information to reproduce it.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images