Advisories ยป MGASA-2022-0009

Updated osgi-core/apache-commons-compress packages fix security vulnerability

Publication date: 11 Jan 2022
Modification date: 11 Jan 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-35515 , CVE-2021-35516 , CVE-2021-35517 , CVE-2021-36090

Description

When reading a specially crafted 7Z archive, the construction of the list
of codecs that decompress an entry can result in an infinite loop. This
could be used to mount a denial of service attack against services that
use Compress' sevenz package. (CVE-2021-35515)
When reading a specially crafted 7Z archive, Compress can be made to
allocate large amounts of memory that finally leads to an out of memory
error even for very small inputs. This could be used to mount a denial of
service attack against services that use Compress' sevenz package.
(CVE-2021-35516)
When reading a specially crafted TAR archive, Compress can be made to
allocate large amounts of memory that finally leads to an out of memory
error even for very small inputs. This could be used to mount a denial of
service attack against services that use Compress' tar package.
(CVE-2021-35517)
When reading a specially crafted ZIP archive, Compress can be made to
allocate large amounts of memory that finally leads to an out of memory
error even for very small inputs. This could be used to mount a denial of
service attack against services that use Compress' zip package.
(CVE-2021-36090)
                

References

SRPMS

8/core