{"schema_version":"1.7.2","id":"OESA-2024-2558","modified":"2024-12-13T13:19:00Z","published":"2024-12-13T13:19:00Z","upstream":["CVE-2024-47554"],"summary":"apache-commons-io security update","details":"Apache commons IO library is used for developing IO functionality. It contains a collecton of utilities with utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.\r\n\r\nSecurity Fix(es):\r\n\r\nUncontrolled Resource Consumption vulnerability in Apache Commons IO.  The org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.   This issue affects Apache Commons IO: from 2.0 before 2.14.0.  Users are recommended to upgrade to version 2.14.0 or later, which fixes the issue.(CVE-2024-47554)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"apache-commons-io","purl":"pkg:rpm/openEuler/apache-commons-io\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.15.1-1.oe2403"}]}],"ecosystem_specific":{"noarch":["apache-commons-io-2.15.1-1.oe2403.noarch.rpm","apache-commons-io-help-2.15.1-1.oe2403.noarch.rpm"],"src":["apache-commons-io-2.15.1-1.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2558"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47554"}],"database_specific":{"severity":"Medium"}}