![]() |
|
Message-ID: <625df810-d6f4-caee-ab2a-25154228bfb7@apache.org> Date: Fri, 09 May 2025 09:29:22 +0000 From: Arnout Engelen <engelen@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-46392: Apache Commons Configuration: StackOverflowError loading untrusted configuration Severity: low Affected versions: - Apache Commons Configuration 1 before 2.0.0 Description: Uncontrolled Resource Consumption vulnerability in Apache Commons Configuration 1.x. There are a number of issues in Apache Commons Configuration 1.x that allow excessive resource consumption when loading untrusted configurations or using unexpected usage patterns. The Apache Commons Configuration team does not intend to fix these issues in 1.x. Apache Commons Configuration 1.x is still safe to use in scenario's where you only load trusted configurations. Users that load untrusted configurations or give attackers control over usage patterns are recommended to upgrade to the 2.x version line, which fixes these issues. Apache Commons Configuration 2.x is not a drop-in replacement, but as it uses a separate Maven groupId and Java package namespace they can be loaded side-by-side, making it possible to do a gradual migration. References: https://www.cve.org/CVERecord?id=CVE-2024-29131 https://www.cve.org/CVERecord?id=CVE-2024-29133 https://commons.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-46392
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.