XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.
This issue has been addressed in the following products: Red Hat Data Grid Via RHSA-2024:10214 https://access.redhat.com/errata/RHSA-2024:10214
This issue has been addressed in the following products: OCP-Tools-4.16-RHEL-9 Via RHSA-2025:2219 https://access.redhat.com/errata/RHSA-2025:2219
This issue has been addressed in the following products: OCP-Tools-4.13-RHEL-8 Via RHSA-2025:2222 https://access.redhat.com/errata/RHSA-2025:2222
This issue has been addressed in the following products: OCP-Tools-4.17-RHEL-9 Via RHSA-2025:2218 https://access.redhat.com/errata/RHSA-2025:2218
This issue has been addressed in the following products: OCP-Tools-4.15-RHEL-8 Via RHSA-2025:2220 https://access.redhat.com/errata/RHSA-2025:2220
This issue has been addressed in the following products: OCP-Tools-4.14-RHEL-8 Via RHSA-2025:2221 https://access.redhat.com/errata/RHSA-2025:2221
This issue has been addressed in the following products: OCP-Tools-4.12-RHEL-8 Via RHSA-2025:2223 https://access.redhat.com/errata/RHSA-2025:2223