Описание
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
libcommons-compress-java | fixed | 1.21-1 | package | |
libcommons-compress-java | no-dsa | bullseye | package | |
libcommons-compress-java | no-dsa | buster | package | |
libcommons-compress-java | no-dsa | stretch | package |
Примечания
https://www.openwall.com/lists/oss-security/2021/07/13/1
Fixed by https://gitbox.apache.org/repos/asf?p=commons-compress.git;a=commit;h=3fe6b42110dc56d0d6fe0aaf80cfecb8feea5321
EPSS
Связанные уязвимости
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
Уязвимость архиватора Apache Commons Compress, связанная с выполнением цикла без достаточного ограничения количества его выполнения, позволяющая нарушителю вызвать отказ в обслуживании
EPSS