An update for apache-mime4j is now available for openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1477 Final 1.0 1.0 2024-04-19 Initial 2024-04-19 2024-04-19 openEuler SA Tool V1.0 2024-04-19 apache-mime4j security update An update for apache-mime4j is now available for openEuler-22.03-LTS-SP2. Java stream based MIME message parser. Security Fix(es): Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages. (CVE-2024-21742) An update for apache-mime4j is now available for openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium apache-mime4j https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1477 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-21742 https://nvd.nist.gov/vuln/detail/CVE-2024-21742 openEuler-22.03-LTS-SP2 apache-mime4j-javadoc-0.8.3-2.oe2203sp2.noarch.rpm apache-mime4j-0.8.3-2.oe2203sp2.noarch.rpm apache-mime4j-0.8.3-2.oe2203sp2.src.rpm Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages. 2024-04-19 CVE-2024-21742 openEuler-22.03-LTS-SP2 Medium 5.6 AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L apache-mime4j security update 2024-04-19 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1477