When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package. References: https://commons.apache.org/proper/commons-compress/security-reports.html https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E http://www.openwall.com/lists/oss-security/2021/07/13/1
Created apache-commons-compress tracking bugs for this issue: Affects: fedora-all [bug 1981896] Created javapackages-bootstrap:202001/apache-commons-compress tracking bugs for this issue: Affects: fedora-all [bug 1981897]
After analysis, a Denial of Service attack is possible via an infinite loop caused by a crafted 7Z archive. The construction of the list of codecs for decompression did not check for usage of the same codec more than once in the codec chain. Thus a specially crafted archive could force an infinite loop impacting availability of a system. This flaw has been fixed in Version 1.21
This issue has been addressed in the following products: Red Hat Fuse 7.11 Via RHSA-2022:5532 https://access.redhat.com/errata/RHSA-2022:5532
This issue has been addressed in the following products: Red Hat Virtualization Engine 4.4 Via RHSA-2022:5555 https://access.redhat.com/errata/RHSA-2022:5555
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-35515