MGASA-2019-0001 - Updated pache-commons-compress packages fix security vulnerabilities

Publication date: 05 Jan 2019
URL: https://advisories.mageia.org/MGASA-2019-0001.html
Type: security
Affected Mageia releases: 6
CVE: CVE-2018-1324,
     CVE-2018-11771

A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A
specially crafted ZIP archive can be used to cause an infinite loop
inside of Apache Commons Compress' extra field parser used by the
ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15.
This can be used to mount a denial of service attack against services
that use Compress' zip package (CVE-2018-1324).

Apache Commons Compress versions 1.7 to 1.17 are vulnerable to a denial
of service attack via crafted ZIP archive. When reading a specially
crafted ZIP archive, the read method of ZipArchiveInputStream can fail
to return the correct EOF indication after the end of the stream has
been reached.  When combined with a java.io.InputStreamReader this can
lead to an infinite stream, which can be used to mount a denial of
service attack against services that use Compress' zip package
(CVE-2018-11771).

References:
- https://bugs.mageia.org/show_bug.cgi?id=22787
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UJ7GKBUCVEHQVGOXIOT6EWCRVDZJMHGK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FLKWBUZ7KVAJV6VZAY2UYW5JIEVMRT2R/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11771

SRPMS:
- 6/core/apache-commons-compress-1.12-1.2.mga6

Mageia 2019-0001: pache-commons-compress security update

A flaw was found in Apache Commons Compress versions 1.11 to 1.15

Summary

A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package (CVE-2018-1324).
Apache Commons Compress versions 1.7 to 1.17 are vulnerable to a denial of service attack via crafted ZIP archive. When reading a specially crafted ZIP archive, the read method of ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package (CVE-2018-11771).

References

- https://bugs.mageia.org/show_bug.cgi?id=22787

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UJ7GKBUCVEHQVGOXIOT6EWCRVDZJMHGK/

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FLKWBUZ7KVAJV6VZAY2UYW5JIEVMRT2R/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1324

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11771

Resolution

MGASA-2019-0001 - Updated pache-commons-compress packages fix security vulnerabilities

SRPMS

- 6/core/apache-commons-compress-1.12-1.2.mga6

Severity
Publication date: 05 Jan 2019
URL: https://advisories.mageia.org/MGASA-2019-0001.html
Type: security
CVE: CVE-2018-1324, CVE-2018-11771

Related News