MGASA-2019-0001

Source
https://advisories.mageia.org/MGASA-2019-0001.html
Import Source
https://advisories.mageia.org/MGASA-2019-0001.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0001
Related
Published
2019-01-05T18:30:16Z
Modified
2019-01-05T18:01:29Z
Summary
Updated pache-commons-compress packages fix security vulnerabilities
Details

A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package (CVE-2018-1324).

Apache Commons Compress versions 1.7 to 1.17 are vulnerable to a denial of service attack via crafted ZIP archive. When reading a specially crafted ZIP archive, the read method of ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package (CVE-2018-11771).

References
Credits

Affected packages

Mageia:6 / apache-commons-compress

Package

Name
apache-commons-compress
Purl
pkg:rpm/mageia/apache-commons-compress?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12-1.2.mga6

Ecosystem specific

{
    "section": "core"
}