Bug 1981909 (CVE-2021-36090)
Summary: | CVE-2021-36090 apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aileenc, alazarot, anstephe, chazlett, dblechte, dfediuck, drieden, eedri, emingora, gmalinko, hhorak, ibek, janstey, java-maint-sig, java-sig-commits, jochrist, jorton, jrokos, jstastny, jwon, krathod, kverlaen, michal.skrivanek, mizdebsk, mkoncek, mnovotny, pdelbell, pjindal, rguimara, rrajasek, sbonazzo, sherold, SpikeFedora, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | apache-commons-compress-1.21 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in apache-commons-compress. When reading a specially crafted ZIP archive, Compress can allocate large amounts of memory that leads to an out-of-memory error for small inputs. This flaw allows the mounting of a denial of service attack against services that use Compress' zip package. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-08-30 03:35:01 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1981910, 1981911, 1983232, 1983233, 1983234, 1983235, 1983236, 1983237, 1992141 | ||
Bug Blocks: | 1981912 |
Description
Guilherme de Almeida Suckevicz
2021-07-13 17:30:26 UTC
Created apache-commons-compress tracking bugs for this issue: Affects: fedora-all [bug 1981911] Created javapackages-bootstrap:202001/apache-commons-compress tracking bugs for this issue: Affects: fedora-all [bug 1981910] After analysis, a Denial of Service attack is possible via excessive memory allocated caused by a crafted zip archive. An ongoing method of allocating an array then trying to fill it, combined with an insufficient check for symbolic link length led to the ability to cause excessive memory allocation. Thus a specially crafted archive could force excessive memory allocation impacting availability of a system. This flaw has been fixed in Version 1.21 This issue has been addressed in the following products: Red Hat Fuse 7.11 Via RHSA-2022:5532 https://access.redhat.com/errata/RHSA-2022:5532 This issue has been addressed in the following products: Red Hat Virtualization Engine 4.4 Via RHSA-2022:5555 https://access.redhat.com/errata/RHSA-2022:5555 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-36090 |