Bug 2049778 (CVE-2022-23596)

Summary: CVE-2022-23596 junrar: A carefully crafted RAR archive can trigger an infinite loop while extracting
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, alazarot, anstephe, chazlett, drieden, emingora, etirelli, gmalinko, hbraun, ibek, janstey, jochrist, jrokos, jstastny, jwon, krathod, kverlaen, mnovotny, pantinor, pdelbell, pjindal, rguimara, rrajasek, tzimanyi
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: junrar 7.4.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-07-07 19:09:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2049779    

Description Guilherme de Almeida Suckevicz 2022-02-02 17:03:12 UTC
Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.

References:
https://github.com/junrar/junrar/issues/73
https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5

Upstream patch:
https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7

Comment 5 errata-xmlrpc 2022-07-07 14:22:15 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.11

Via RHSA-2022:5532 https://access.redhat.com/errata/RHSA-2022:5532

Comment 6 Product Security DevOps Team 2022-07-07 19:09:15 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-23596