Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1557542 - (CVE-2018-1324) CVE-2018-1324 apache-commons-compress: Infinite loop via extra field parser in ZipFile and ZipArchiveInputStream classes
CVE-2018-1324 apache-commons-compress: Infinite loop via extra field parser ...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180316,repor...
: Security
Depends On: 1563527 1557543 1558341 1558342 1563526
Blocks: 1557544
  Show dependency treegraph
 
Reported: 2018-03-16 16:25 EDT by Pedro Sampaio
Modified: 2018-08-18 07:28 EDT (History)
92 users (show)

See Also:
Fixed In Version: apache-commons-compress 1.16
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Pedro Sampaio 2018-03-16 16:25:18 EDT
A flaw was found in Apache Commons Compress versions 1.11 to 1.15. A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.

Upstream patch:

https://git-wip-us.apache.org/repos/asf?p=commons-compress.git;a=blobdiff;f=src/main/java/org/apache/commons/compress/archivers/zip/X0017_StrongEncryptionHeader.java;h=acc3b22346b49845e85b5ef27a5814b69e834139;hp=0feb9c98cc622cde1defa3bbd268ef82b4ae5c18;hb=2a2f1dc48e22a34ddb72321a4db211da91aa933b;hpb=dcb0486fb4cb2b6592c04d6ec2edbd3f690df5f2

Upstream issue:

https://issues.apache.org/jira/browse/COMPRESS-432
Comment 1 Pedro Sampaio 2018-03-16 16:25:49 EDT
Created apache-commons-compress tracking bugs for this issue:

Affects: fedora-all [bug 1557543]
Comment 2 Pedro Sampaio 2018-03-16 16:26:41 EDT
External References:

https://commons.apache.org/proper/commons-compress/security-reports.html
Comment 3 Kurt Seifried 2018-03-19 12:04:37 EDT
Statement:

This issue affects the versions of lucene4 as shipped with Red Hat Enterprise Satellite 6.0 and 6.1. Red Hat Satellite 6.2 and later do not include the lucene4 component and are not affected.
Comment 5 Fedora Update System 2018-03-27 15:27:57 EDT
apache-commons-compress-1.13-3.fc26 has been pushed to the Fedora 26 stable repository. If problems still persist, please make note of it in this bug report.
Comment 6 Fedora Update System 2018-03-27 16:03:51 EDT
apache-commons-compress-1.14-3.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.
Comment 9 Jason Shepherd 2018-06-12 00:13:14 EDT
RHMAP has a dependency on commons-compress because it's required by log4j-core. Log4j-core only uses commons-compress for compression of log files, and doesn't provide any decompression functionality. Therefore log4j-core and RHMAP are not affected by this flaw.

Note You need to log in before you can comment on or make changes to this bug.