OESA-2024-2558

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2558
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2558.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-2558
Upstream
Published
2024-12-13T13:19:00Z
Modified
2025-08-12T05:46:04.253093Z
Summary
apache-commons-io security update
Details

Apache commons IO library is used for developing IO functionality. It contains a collecton of utilities with utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.

Security Fix(es):

Uncontrolled Resource Consumption vulnerability in Apache Commons IO. The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input. This issue affects Apache Commons IO: from 2.0 before 2.14.0. Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.(CVE-2024-47554)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS / apache-commons-io

Package

Name
apache-commons-io
Purl
pkg:rpm/openEuler/apache-commons-io&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.15.1-1.oe2403

Ecosystem specific

{
    "src": [
        "apache-commons-io-2.15.1-1.oe2403.src.rpm"
    ],
    "noarch": [
        "apache-commons-io-2.15.1-1.oe2403.noarch.rpm",
        "apache-commons-io-help-2.15.1-1.oe2403.noarch.rpm"
    ]
}