Ses also https://github.com/google/oss-fuzz/pull/11616/files

Gary

On Mon, Feb 19, 2024 at 3:57 PM Gary Gregory <garydgreg...@gmail.com> wrote:
>
> Hi Magnus and all,
>
> This was discovered through fuzz testing, basically if some bits in
> some parts of a file follow some pattern, then the infinite loop kicks
> in. It only happens if your Commons Compress client code decides to
> parse a DUMP file.
>
> The ticket https://issues.apache.org/jira/browse/COMPRESS-632 is an
> umbrella ticket that gathers fuzz testing issues, and it was recently
> amended with further tests for this specific issue.
>
> The PR you show for a different issue.
>
> Security issues are NOT reported or discussed in public until a fix is
> made available in a release.
>
> Please see:
> - https://commons.apache.org/proper/commons-compress/security.html
> - https://commons.apache.org/security.html
>
> Gary
>
> On Mon, Feb 19, 2024 at 3:33 PM Reftel, Magnus
> <magnus.ref...@skatteetaten.no.invalid> wrote:
> >
> > Hi,
> >
> > Are there any more details on this issue? For instance, under what 
> > circumstances would an application that uses the commons-compress library 
> > be vulnerable? The subject line hints that the flaw is specific to the Dump 
> > format. Is that correct? Are there any options that need to be 
> > enabled/disabled for the application to vulnerable?
> > Also, is it correct that this is related to what was reported in 
> > https://issues.apache.org/jira/browse/COMPRESS-632 and was fixed in 
> > https://github.com/apache/commons-compress/pull/442 ?
> >
> > Best Regards
> > Magnus Reftel
> >
> > On 2024/02/19 01:25:47 "Gary D. Gregory" wrote:
> > > Severity: important
> > >
> > > Affected versions:
> > >
> > > - Apache Commons Compress 1.3 through 1.25.0
> > >
> > > Description:
> > >
> > > Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in 
> > > Apache Commons Compress.This issue affects Apache Commons Compress: from 
> > > 1.3 through 1.25.0.
> > >
> > > Users are recommended to upgrade to version 1.26.0 which fixes the issue.
> > >
> > > Credit:
> > >
> > > Yakov Shafranovich, Amazon Web Services (reporter)
> > >
> > > References:
> > >
> > > https://commons.apache.org/
> > > https://www.cve.org/CVERecord?id=CVE-2024-25710
> > >
> > >
> > > ---------------------------------------------------------------------
> > > To unsubscribe, e-mail: 
> > > user-unsubscr...@commons.apache.org<mailto:user-unsubscr...@commons.apache.org>
> > > For additional commands, e-mail: 
> > > user-h...@commons.apache.org<mailto:user-h...@commons.apache.org>
> > >
> > >
> >
> > ________________________________
> > Denne e-posten og eventuelle vedlegg er beregnet utelukkende for den 
> > institusjon eller person den er rettet til og kan vaere belagt med 
> > lovbestemt taushetsplikt. Dersom e-posten er feilsendt, vennligst slett den 
> > og kontakt Skatteetaten.
> > The contents of this email message and any attachments are intended solely 
> > for the addressee(s) and may contain confidential information and may be 
> > legally protected from disclosure. If you are not the intended recipient of 
> > this message, please immediately delete the message and alert the Norwegian 
> > Tax Administration.

---------------------------------------------------------------------
To unsubscribe, e-mail: user-unsubscr...@commons.apache.org
For additional commands, e-mail: user-h...@commons.apache.org

Reply via email to