Kitxuuu's picture
Add files using upload-large-folder tool
437da41 verified
<?xml version="1.0"?>
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<document xmlns="http://maven.apache.org/XDOC/2.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/XDOC/2.0 https://maven.apache.org/xsd/xdoc-2.0.xsd">
<properties>
<title>Commons Compress Security Reports</title>
<author email="dev@commons.apache.org">Commons Team</author>
</properties>
<body>
<section name="General Information">
<p>For information about reporting or asking questions about
security problems, please see the <a
href="https://commons.apache.org/security.html">security page
of the Commons project</a>.</p>
</section>
<section name="Apache Commons Compress Security Vulnerabilities">
<p>This page lists all security vulnerabilities fixed in
released versions of Apache Commons Compress. Each
vulnerability is given a security impact rating by the
development team - please note that this rating may vary from
platform to platform. We also list the versions of Commons
Compress the flaw is known to affect, and where a flaw has not
been verified list the version with a question mark.</p>
<p>Please note that binary patches are never provided. If you
need to apply a source code patch, use the building
instructions for the Commons Compress version that you are
using.</p>
<p>If you need help on building Commons Compress or other help
on following the instructions to mitigate the known
vulnerabilities listed here, please send your questions to the
public <a href="mail-lists.html">Compress Users mailing
list</a>.</p>
<p>If you have encountered an unlisted security vulnerability
or other unexpected behavior that has security impact, or if
the descriptions here are incomplete, please report them
privately to the Apache Security Team. Thank you.</p>
<subsection name="Fixed in Apache Commons Compress 1.26.0">
<p><b>Important: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25710">CVE-2024-25710</a></p>
<p>This affects version 1.3 through 1.25.0.</p>
<p>This denial of service is caused by an infinite loop reading a corrupted DUMP file.</p>
<p>Users are recommended to upgrade to version 1.26.0 which fixes the issue.</p>
<p>Credit to Yakov Shafranovich, Amazon Web Services (reporter).</p>
<p><b>Moderate: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26308">CVE-2024-26308</a></p>
<p>You can get an OutOfMemoryError unpacking a broken Pack200 file.</p>
<p>This issue affects Commons Compress 1.21 before 1.26.0.</p>
<p>Users are recommended to upgrade to version 1.26.0 which fixes the issue.</p>
<p>Credit to Yakov Shafranovich, Amazon Web Services (reporter).</p>
</subsection>
<subsection name="Fixed in Apache Commons Compress 1.24.0">
<p><b>Moderate: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42503">CVE-2023-42503</a></p>
<p>Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.</p>
<p>This issue affects Apache Commons Compress: from 1.22 before 1.24.0.</p>
<p>Users are recommended to upgrade to version 1.24.0, which fixes the issue.</p>
<p>A third party can create a malformed TAR file by manipulating file modification times headers,
which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption.</p>
<p>In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision
(issue # COMPRESS-612<sup><a href="#Ref-1-24-1">[1]</a></sup>).
The format for the PAX extended headers carrying this data consists of two numbers separated by a period<sup><a href="#Ref-1-24-2">[2]</a></sup>,
indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and
“LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values.</p>
<p>Parsing of these numbers uses the BigDecimal<sup><a href="#Ref-1-24-3">[3]</a></sup> class from the JDK which has a publicly known algorithmic complexity issue when doing
operations on large numbers, causing denial of service (see issue # JDK-6560193<sup><a href="#Ref-1-24-4">[4]</a></sup>). A third party can manipulate file time headers
in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”)
within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a
denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098<sup><a href="#Ref-1-24-5">[5]</a></sup>.</p>
<ul>
<li id="Ref-1-24-1">[1]: <a href="https://issues.apache.org/jira/browse/COMPRESS-612">COMPRESS-612</a></li>
<li id="Ref-1-24-2">[2]: <a href="https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05">PAX extended headers</a></li>
<li id="Ref-1-24-3">[3]: <a href="https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html">BigDecimal</a></li>
<li id="Ref-1-24-4">[4]: <a href="https://bugs.openjdk.org/browse/JDK-6560193">JDK-6560193</a></li>
<li id="Ref-1-24-5">[5]: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098">CVE-2012-2098</a></li>
</ul>
<p>Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile
classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted.</p>
</subsection>
<subsection name="Fixed in Apache Commons Compress 1.21">
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35515">CVE-2021-35515</a></p>
<p>When reading a specially crafted 7Z archive, the construction of the
list of codecs that decompress an entry can result in an infinite
loop. This could be used to mount a denial of service attack against
services that use Compress' sevenz package.</p>
<p>This was fixed in revision <a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=3fe6b42110dc56d0d6fe0aaf80cfecb8feea5321">3fe6b42</a>.</p>
<p>This issue was discovered by OSS Fuzz.</p>
<p>Affects: 1.6 - 1.20</p>
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35516">CVE-2021-35516</a></p>
<p>When reading a specially crafted 7Z archive, Compress can be made to
allocate large amounts of memory that finally leads to an out of memory
error even for very small inputs. This could be used to mount a denial
of service attack against services that use Compress' sevenz package.</p>
<p>This was fixed in revisions
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=26924e96c7730db014c310757e11c9359db07f3e">26924e9</a>,
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=c51de6cfaec75b21566374158f25e1734c3a94cb">c51de6c</a>,
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=0aba8b8fd8053ae323f15d736d1762b2161c76a6">0aba8b8</a>,
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=60d551a748236d7f4651a4ae88d5a351f7c5754b">60d551a</a>,
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=bf5a5346ae04b9d2a5b0356ca75f11dcc8d94789">bf5a534</a>,
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=5761493cbaf7a7d608a3b68f4d61aaa822dbeb4f">5761493</a>,
and <a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=ae2b27cc011f47f0289cb24a11f2d4f1db711f8a">ae2b27c</a>
.</p>
<p>This issue was first reported to the project's issue tracker as
<a href="https://issues.apache.org/jira/browse/COMPRESS-542">COMPRESS-542</a>
by Robin Schimpf.
Later OSS Fuzz detected ways to exploit this issue which managed to
escape the initial attempt to fix it.</p>
<p>Affects: 1.6 - 1.20</p>
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35517">CVE-2021-35517</a></p>
<p>When reading a specially crafted TAR archive, Compress
can be made to allocate large amounts of memory that finally
leads to an out of memory error even for very small
inputs. This could be used to mount a denial of service
attack against services that use Compress' tar package.</p>
<p>This was fixed in revisions
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=d0af873e77d16f41edfef7b69da5c8c35c96a650">d0af873</a>,
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=7ce1b0796d6cbe1f41b969583bd49f33ae0efef0">7ce1b07</a>
and <a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=80124dd9fe4b0a0b2e203ca19aacac8cd0afc96f">80124dd</a>.</p>
<p>This issue was discovered by OSS Fuzz.</p>
<p>Affects: 1.1 - 1.20</p>
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36090">CVE-2021-36090</a></p>
<p>When reading a specially crafted ZIP archive, Compress
can be made to allocate large amounts of memory that finally
leads to an out of memory error even for very small
inputs. This could be used to mount a denial of service
attack against services that use Compress' zip package.</p>
<p>This was fixed in revisions
<a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=ef5d70b625000e38404194aaab311b771c44efda">ef5d70b</a>
and <a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=80124dd9fe4b0a0b2e203ca19aacac8cd0afc96f">80124dd</a>.</p>
<p>This issue was discovered by OSS Fuzz.</p>
<p>Affects: 1.0 - 1.20</p>
</subsection>
<subsection name="Fixed in Apache Commons Compress 1.19">
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12402">CVE-2019-12402</a></p>
<p>The file name encoding algorithm used internally in Apache Commons
Compress can get into an infinite loop when faced with specially
crafted inputs. This can lead to a denial of service attack if an
attacker can choose the file names inside of an archive created by
Compress.</p>
<p>This was fixed in revision <a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commitdiff;h=4ad5d80a6272e007f64a6ac66829ca189a8093b9;hp=16a0c84e84b93cc8c107b7ff3080bd11317ab581">4ad5d80a</a>.</p>
<p>This was first reported to the Commons Security Team on 22 August
2019 and made public on 27 August 2019.</p>
<p>Affects: 1.15 - 1.18</p>
</subsection>
<subsection name="Fixed in Apache Commons Compress 1.18">
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11771">CVE-2018-11771</a></p>
<p>When reading a specially crafted ZIP archive, the read
method of <code>ZipArchiveInputStream</code> can fail to
return the correct EOF indication after the end of the
stream has been reached. When combined with a
<code>java.io.InputStreamReader</code> this can lead to an
infinite stream, which can be used to mount a denial of
service attack against services that use Compress' zip
package</p>
<p>This was fixed in revision <a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=blobdiff;f=src/main/java/org/apache/commons/compress/archivers/zip/ZipArchiveInputStream.java;h=e1995d7aa51dfac6ae933987fb0b7760c607582b;hp=0a2c1aa0063c620c867715119eae2013c87b5e70;hb=a41ce6892cb0590b2e658704434ac0dbcb6834c8;hpb=64ed6dde03afbef6715fdfdeab5fc04be6192899">a41ce68</a>.</p>
<p>This was first reported to the Security Team on 14 June
2018 and made public on 16 August 2018.</p>
<p>Affects: 1.7 - 1.17</p>
</subsection>
<subsection name="Fixed in Apache Commons Compress 1.16">
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1324">CVE-2018-1324</a></p>
<p>A specially crafted ZIP archive can be used to cause an
infinite loop inside of Compress' extra field parser used by
the <code>ZipFile</code> and
<code>ZipArchiveInputStream</code> classes. This can be
used to mount a denial of service attack against services
that use Compress' zip package.</p>
<p>This was fixed in revision <a
href="https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=blobdiff;f=src/main/java/org/apache/commons/compress/archivers/zip/X0017_StrongEncryptionHeader.java;h=acc3b22346b49845e85b5ef27a5814b69e834139;hp=0feb9c98cc622cde1defa3bbd268ef82b4ae5c18;hb=2a2f1dc48e22a34ddb72321a4db211da91aa933b;hpb=dcb0486fb4cb2b6592c04d6ec2edbd3f690df5f2">2a2f1dc4</a>.</p>
<p>This was first reported to the project's JIRA on <a
href="https://issues.apache.org/jira/browse/COMPRESS-432">19
December 2017</a>.</p>
<p>Affects: 1.11 - 1.15</p>
</subsection>
<subsection name="Fixed in Apache Commons Compress 1.4.1">
<p><b>Low: Denial of Service</b> <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098">CVE-2012-2098</a></p>
<p>The bzip2 compressing streams in Apache Commons Compress
internally use sorting algorithms with unacceptable
worst-case performance on very repetitive inputs. A
specially crafted input to Compress'
<code>BZip2CompressorOutputStream</code> can be used to make
the process spend a very long time while using up all
available processing time effectively leading to a denial of
service.</p>
<p>This was fixed in revisions
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1332540">1332540</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1332552">1332552</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1333522">1333522</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1337444">1337444</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340715">1340715</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340723">1340723</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340757">1340757</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340786">1340786</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340787">1340787</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340790">1340790</a>,
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340795">1340795</a> and
<a href="https://svn.apache.org/viewvc?view=revision&amp;revision=1340799">1340799</a>.</p>
<p>This was first reported to the Security Team on 12 April
2012 and made public on 23 May 2012.</p>
<p>Affects: 1.0 - 1.4</p>
</subsection>
</section>
<section name="Errors and Omissions">
<p>Please report any errors or omissions to <a
href="mail-lists.html">the dev mailing list</a>.</p>
</section>
</body>
</document>