Source: libcommons-compress-java Version: 1.13-1 Severity: important Tags: patch security upstream Forwarded: https://issues.apache.org/jira/browse/COMPRESS-432
Hi, the following vulnerability was published for libcommons-compress-java. CVE-2018-1324[0]: | A specially crafted ZIP archive can be used to cause an infinite loop | inside of Apache Commons Compress' extra field parser used by the | ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. | This can be used to mount a denial of service attack against services | that use Compress' zip package. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-1324 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1324 [1] https://issues.apache.org/jira/browse/COMPRESS-432 [2] https://git-wip-us.apache.org/repos/asf?p=commons-compress.git;a=blobdiff;f=src/main/java/org/apache/commons/compress/archivers/zip/X0017_StrongEncryptionHeader.java;h=acc3b22346b49845e85b5ef27a5814b69e834139;hp=0feb9c98cc622cde1defa3bbd268ef82b4ae5c18;hb=2a2f1dc48e22a34ddb72321a4db211da91aa933b;hpb=dcb0486fb4cb2b6592c04d6ec2edbd3f690df5f2 Regards, Salvatore