Skip to content

Security vulnerability in dependent libraryΒ #121

@eydevelopment

Description

@eydevelopment

White source flagged security vulnerability issue in commons-compress:jar:1.8, which is used by me.raynes:fs:jar:1.4.6.

Following is the dependency tree:

+- me.raynes:fs:jar:1.4.6:compile
| +- (org.clojure:clojure:jar:1.4.0:compile
| - (org.apache.commons:commons-compress:jar:1.8:compile)

White source concern:

When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.

Suggested fix:

I. Upgrade to version 1.18

II. The vendor has issued a fix (1.18).
The vendor advisory is available at:
https://commons.apache.org/proper/commons-compress/security-reports.html#Apache_Commons_Compress_Security_Vulnerabilities

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions