Updated pache-commons-compress packages fix security vulnerabilities
Publication date: 05 Jan 2019Modification date: 05 Jan 2019
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-1324 , CVE-2018-11771
Description
A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package (CVE-2018-1324). Apache Commons Compress versions 1.7 to 1.17 are vulnerable to a denial of service attack via crafted ZIP archive. When reading a specially crafted ZIP archive, the read method of ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package (CVE-2018-11771).
References
- https://bugs.mageia.org/show_bug.cgi?id=22787
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UJ7GKBUCVEHQVGOXIOT6EWCRVDZJMHGK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FLKWBUZ7KVAJV6VZAY2UYW5JIEVMRT2R/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11771
SRPMS
6/core
- apache-commons-compress-1.12-1.2.mga6