This is an automated email from the ASF dual-hosted git repository.
garydgregory pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/commons-configuration.git
The following commit(s) were added to refs/heads/master by this push:
new 31ed6d4b1 Document CVE-2026-45205
31ed6d4b1 is described below
commit 31ed6d4b1c95df1cc3fa736a6ec1658ff89a656f
Author: Gary Gregory <[email protected]>
AuthorDate: Thu May 14 11:14:36 2026 +0000
Document CVE-2026-45205
---
src/changes/changes.xml | 4 ++--
src/site/xdoc/security.xml | 23 ++++++++++++++++++++---
2 files changed, 22 insertions(+), 5 deletions(-)
diff --git a/src/changes/changes.xml b/src/changes/changes.xml
index 3ed190cf8..98d47ff87 100644
--- a/src/changes/changes.xml
+++ b/src/changes/changes.xml
@@ -29,10 +29,10 @@
<!-- ADD -->
<!-- UPDATE -->
</release>
- <release version="2.15.0" date="2026-05-11" description="Minor release
with new features and updated dependencies; requires Java 8 or above.">
+ <release version="2.15.0" date="2026-05-11" description="Minor release
with new features and updated dependencies; requires Java 8 or above; fixes
CVE-2026-45205.">
<!-- FIX -->
<action type="fix" dev="ggregory" due-to="Gary Gregory">Disable include
schemes http[s] by default, see AbstractFileLocationStrategy #633.</action>
- <action type="fix" dev="ggregory" due-to="Erichen, Gary Gregory">Detect
and avoid processing cycles in YAML input (YAMLConfiguration) #634.</action>
+ <action type="fix" dev="ggregory" due-to="Erichen, Gary
Gregory">CVE-2026-45205: Detect and avoid processing cycles in YAML input
(YAMLConfiguration) #634.</action>
<action type="fix" dev="ggregory" due-to="Piotr P. Karwasz, Gary
Gregory">Extend scheme validation to inner schemes of jar: URLs #636.</action>
<!-- ADD -->
<!-- UPDATE -->
diff --git a/src/site/xdoc/security.xml b/src/site/xdoc/security.xml
index d83817c96..95b9593d2 100644
--- a/src/site/xdoc/security.xml
+++ b/src/site/xdoc/security.xml
@@ -55,7 +55,7 @@ limitations under the License.
'Denial of service' here means causing resource usage
disproportionate to the input size.
</p>
</subsection>
- <subsection name="CVE-2022-33980 prior to 2.8.0, RCE when applied
to untrusted input">
+ <subsection name="CVE-2022-33980, prior to 2.8.0, RCE when applied
to untrusted input">
<p>
On 2022-07-06, the Apache Commons Configuration team
disclosed
<a
href="https://www.cve.org/CVERecord?id=CVE-2022-33980">CVE-2022-33980</a>
@@ -124,7 +124,7 @@ limitations under the License.
</li>
</ul>
</subsection>
- <subsection name="CVE-2024-29131 prior to 2.10.1, Out-of-bounds
Write vulnerability">
+ <subsection name="CVE-2024-29131, prior to 2.10.1, Out-of-bounds
Write vulnerability">
<p>
On 2024-03-20, the Apache Commons Configuration team
disclosed <a
href="https://www.cve.org/CVERecord?id=CVE-2024-29131">CVE-2024-29131</a>.
</p>
@@ -135,7 +135,7 @@ limitations under the License.
The details are in <a
href="https://issues.apache.org/jira/browse/CONFIGURATION-840">CONFIGURATION-840</a>.
</p>
</subsection>
- <subsection name="CVE-2024-29133 prior to 2.10.1, Out-of-bounds
Write vulnerability">
+ <subsection name="CVE-2024-29133, prior to 2.10.1, Out-of-bounds
Write vulnerability">
<p>
On 2024-03-20, the Apache Commons Configuration team
disclosed <a
href="https://www.cve.org/CVERecord?id=CVE-2024-29133">CVE-2024-29133</a>.
</p>
@@ -146,6 +146,23 @@ limitations under the License.
The details are in <a
href="https://issues.apache.org/jira/browse/CONFIGURATION-840">CONFIGURATION-841</a>.
</p>
</subsection>
+ <subsection name="CVE-2026-45205, prior to 2.15.0, Apache Commons
Configuration: StackOverflowError for YAML input with cycles ">
+ <p>
+ On 2026-05-14, the Apache Commons Configuration team
disclosed <a
href="https://www.cve.org/CVERecord?id=CVE-2026-45205">CVE-2026-45205</a>.
+ </p>
+ <p>
+ When processing an untrusted configuration file, Commons
Configuration will throw a StackOverflowError for YAML input with cycles.
+ This issue affects Apache Commons: from 2.2 before 2.15.0.
+ Users are recommended to upgrade to version 2.15.0, which
fixes the issue.
+ </p>
+ <p>
+ References:
+ </p>
+ <ul>
+ <li><a
href="https://www.cve.org/CVERecord?id=CVE-2026-45205">CVE-2026-45205</a></li>
+ <li><a href="PR
#634">https://github.com/apache/commons-configuration/pull/634</a></li>
+ </ul>
+ </subsection>
</section>
<section name="Safe Deserialization">
<p>