USN-8191-1

Source
https://ubuntu.com/security/notices/USN-8191-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8191-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8191-1
Upstream
Related
Published
2026-04-21T11:36:11Z
Modified
2026-05-20T16:06:18.588453210Z
Summary
commons-io vulnerability
Details

It was discovered that Apache Commons IO's XmlStreamReader class could excessively consume CPU resources under certain circumstances. An attacker could possibly use this issue to cause Apache Commons IO to crash, resulting in a denial of service.

References

Affected packages

Ubuntu:Pro:14.04:LTS
commons-io

Package

Name
commons-io
Purl
pkg:deb/ubuntu/commons-io?arch=source&distro=esm-infra-legacy%2Ftrusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4-2ubuntu0.1~esm2

Affected versions

2.*
2.4-2
2.4-2ubuntu0.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libcommons-io-java",
            "binary_version": "2.4-2ubuntu0.1~esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2024-47554"
        }
    ],
    "ecosystem": "Ubuntu:Pro:14.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8191-1.json"
Ubuntu:Pro:16.04:LTS
commons-io

Package

Name
commons-io
Purl
pkg:deb/ubuntu/commons-io?arch=source&distro=esm-infra-legacy%2Fxenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4-2ubuntu0.16.04.1~esm1

Affected versions

2.*
2.4-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libcommons-io-java",
            "binary_version": "2.4-2ubuntu0.16.04.1~esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8191-1.json"
Ubuntu:Pro:18.04:LTS
commons-io

Package

Name
commons-io
Purl
pkg:deb/ubuntu/commons-io?arch=source&distro=esm-apps%2Fbionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6-2ubuntu0.18.04.1+esm1

Affected versions

2.*
2.5-1
2.5-2
2.6-1
2.6-2
2.6-2ubuntu0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libcommons-io-java",
            "binary_version": "2.6-2ubuntu0.18.04.1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2024-47554"
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8191-1.json"
Ubuntu:Pro:20.04:LTS
commons-io

Package

Name
commons-io
Purl
pkg:deb/ubuntu/commons-io?arch=source&distro=esm-apps%2Ffocal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6-2ubuntu0.20.04.1+esm1

Affected versions

2.*
2.6-2
2.6-2ubuntu0.20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libcommons-io-java",
            "binary_version": "2.6-2ubuntu0.20.04.1+esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2024-47554"
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8191-1.json"
Ubuntu:Pro:22.04:LTS
commons-io

Package

Name
commons-io
Purl
pkg:deb/ubuntu/commons-io?arch=source&distro=esm-apps%2Fjammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.11.0-2ubuntu0.22.04.1~esm1

Affected versions

2.*
2.8.0-1
2.11.0-1
2.11.0-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libcommons-io-java",
            "binary_version": "2.11.0-2ubuntu0.22.04.1~esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2024-47554"
        }
    ],
    "ecosystem": "Ubuntu:Pro:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8191-1.json"
Ubuntu:Pro:24.04:LTS
commons-io

Package

Name
commons-io
Purl
pkg:deb/ubuntu/commons-io?arch=source&distro=esm-apps%2Fnoble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.11.0-2ubuntu0.24.04.1~esm1

Affected versions

2.*
2.11.0-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libcommons-io-java",
            "binary_version": "2.11.0-2ubuntu0.24.04.1~esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2024-47554"
        }
    ],
    "ecosystem": "Ubuntu:Pro:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8191-1.json"