An update for apache-mime4j is now available for openEuler-22.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1333
Final
1.0
1.0
2024-03-29
Initial
2024-03-29
2024-03-29
openEuler SA Tool V1.0
2024-03-29
apache-mime4j security update
An update for apache-mime4j is now available for openEuler-22.03-LTS-SP3.
Java stream based MIME message parser.
Security Fix(es):
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message.
This can be exploited by an attacker to add unintended headers to MIME messages.
(CVE-2024-21742)
An update for apache-mime4j is now available for openEuler-22.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
apache-mime4j
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1333
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-21742
https://nvd.nist.gov/vuln/detail/CVE-2024-21742
openEuler-22.03-LTS-SP3
apache-mime4j-0.8.3-2.oe2203sp3.noarch.rpm
apache-mime4j-javadoc-0.8.3-2.oe2203sp3.noarch.rpm
apache-mime4j-0.8.3-2.oe2203sp3.src.rpm
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message.
This can be exploited by an attacker to add unintended headers to MIME messages.
2024-03-29
CVE-2024-21742
openEuler-22.03-LTS-SP3
Medium
5.6
AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
apache-mime4j security update
2024-03-29
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1333