U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-47072

Change History

New CVE Received from GitHub, Inc. 11/07/2024 7:15:14 PM

Action Type Old Value New Value
Added Description

								
							
							
						
XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.
Added CVSS V3.1

								
							
							
						
GitHub, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
GitHub, Inc. CWE-121
Added CWE

								
							
							
						
GitHub, Inc. CWE-502
Added Reference

								
							
							
						
GitHub, Inc. https://github.com/x-stream/xstream/commit/bb838ce2269cac47433e31c77b2b236466e9f266 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. https://github.com/x-stream/xstream/security/advisories/GHSA-hfq9-hggm-c56q [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. https://x-stream.github.io/CVE-2024-47072.html [No types assigned]