Bug 1221797 (CVE-2024-29131) - VUL-0: CVE-2024-29131: apache-commons-configuration,apache-commons-configuration2: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
Summary: VUL-0: CVE-2024-29131: apache-commons-configuration,apache-commons-configurat...
Status: RESOLVED FIXED
Alias: CVE-2024-29131
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Gus Kenion
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/398401/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-29131:4.4:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-21 09:22 UTC by SMASH SMASH
Modified: 2024-05-17 10:00 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-03-21 09:22:18 UTC
From: "Gary D. Gregory" <ggregory () apache org>
Date: Wed, 20 Mar 2024 21:53:38 +0000

Severity: low

Affected versions:

- Apache Commons Configuration 2.0 before 2.10.1

Description:

Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue affects Apache Commons Configuration: from 
2.0 before 2.10.1.

Users are recommended to upgrade to version 2.10.1, which fixes the issue.

This issue is being tracked as CONFIGURATION-840 

Credit:

Bob Marinier (finder)

References:

https://commons.apache.org/
https://issues.apache.org/jira/browse/CONFIGURATION-840
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-29131
https://seclists.org/oss-sec/2024/q1/239
https://www.cve.org/CVERecord?id=CVE-2024-29131

Patch:
https://github.com/apache/commons-configuration/commit/56b5c4dcdffbde27870df5a3105d6a5f9b22f554
Comment 2 Andrea Mattiazzo 2024-03-21 09:32:38 UTC
Tracking as affected:
- SUSE:SLE-15-SP2:Update/apache-commons-configuration2  2.9.0
- openSUSE:Factory/apache-commons-configuration2        2.9.0
Comment 3 Fridrich Strba 2024-03-21 16:10:16 UTC
Upgrade to 2.10.1 is the best and straight-forward solution. Gus, please have a look. For Factory and also for SUSE:SLE-15-SP2:Update
Comment 4 Fridrich Strba 2024-03-22 10:33:46 UTC
A modified reproducer was triggering the same problem in our commons-configuration 1.10 in SLE-15-SP2. I backported the upstream fix from 2.x to 1.10 and the reproducer is happy.
So, let us add 
              SUSE:SLE-15-SP2:Update apache-commons-configuration
as affected.
I submitted the fix. Bot will tell us about its number soon.
Comment 6 Gus Kenion 2024-03-22 13:05:29 UTC
Upgraded apache-commons-configuration2 to v2.10.1.  apache-commons-configuration received backported fix; see Fridrich's previous comment.  These changes fix the issue for their respective packages.
Comment 10 Maintenance Automation 2024-04-22 12:30:27 UTC
SUSE-SU-2024:1365-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221793, 1221797
CVE References: CVE-2024-29131, CVE-2024-29133
Maintenance Incident: [SUSE:Maintenance:33041](https://smelt.suse.de/incident/33041/)
Sources used:
openSUSE Leap 15.5 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
Development Tools Module 15-SP5 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1
SUSE Enterprise Storage 7.1 (src):
 apache-commons-configuration2-2.10.1-150200.5.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2024-04-22 16:30:02 UTC
SUSE-SU-2024:1377-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1221793, 1221797
CVE References: CVE-2024-29131, CVE-2024-29133
Maintenance Incident: [SUSE:Maintenance:33035](https://smelt.suse.de/incident/33035/)
Sources used:
openSUSE Leap 15.5 (src):
 apache-commons-configuration-1.10-150200.3.11.1
Development Tools Module 15-SP5 (src):
 apache-commons-configuration-1.10-150200.3.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.