Mageia 2019-0001: pache-commons-compress security update
Summary
A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A
specially crafted ZIP archive can be used to cause an infinite loop
inside of Apache Commons Compress' extra field parser used by the
ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15.
This can be used to mount a denial of service attack against services
that use Compress' zip package (CVE-2018-1324).
Apache Commons Compress versions 1.7 to 1.17 are vulnerable to a denial
of service attack via crafted ZIP archive. When reading a specially
crafted ZIP archive, the read method of ZipArchiveInputStream can fail
to return the correct EOF indication after the end of the stream has
been reached. When combined with a java.io.InputStreamReader this can
lead to an infinite stream, which can be used to mount a denial of
service attack against services that use Compress' zip package
(CVE-2018-11771).
References
- https://bugs.mageia.org/show_bug.cgi?id=22787
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UJ7GKBUCVEHQVGOXIOT6EWCRVDZJMHGK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FLKWBUZ7KVAJV6VZAY2UYW5JIEVMRT2R/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11771
Resolution
MGASA-2019-0001 - Updated pache-commons-compress packages fix security vulnerabilities
SRPMS
- 6/core/apache-commons-compress-1.12-1.2.mga6