Lucene search

K
mageiaGentoo FoundationMGASA-2019-0001
HistoryJan 05, 2019 - 9:30 p.m.

Updated pache-commons-compress packages fix security vulnerabilities

2019-01-0521:30:16
Gentoo Foundation
advisories.mageia.org
5

0.001 Low

EPSS

Percentile

50.5%

A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress’ extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress’ zip package (CVE-2018-1324). Apache Commons Compress versions 1.7 to 1.17 are vulnerable to a denial of service attack via crafted ZIP archive. When reading a specially crafted ZIP archive, the read method of ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress’ zip package (CVE-2018-11771).

OSVersionArchitecturePackageVersionFilename
Mageia6noarchapache-commons-compress< 1.12-1.2apache-commons-compress-1.12-1.2.mga6