The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream.
XStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead.
The only solution is to catch the StackOverflowError in the client code calling XStream.
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for CVE-2022-40151.
The vulnerability was discovered and reported by Henry Lin of the Google OSS-Fuzz team.
If you have any questions or comments about this advisory: * Open an issue in XStream * Contact us at XStream Google Group