"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-07-13 08:00:59 +00:00
parent d356c9061e
commit 27a839b858
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 32 additions and 24 deletions

View File

@ -48,7 +48,7 @@
"description_data": [
{
"lang": "eng",
"value": "When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.\n"
"value": "When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package."
}
]
},
@ -75,12 +75,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html"
"refsource": "MISC",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html",
"name": "https://commons.apache.org/proper/commons-compress/security-reports.html"
},
{
"refsource": "CONFIRM",
"url": "https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E"
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E",
"name": "https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E"
}
]
},
@ -93,4 +95,4 @@
"value": "Commons Compress users should upgrade to 1.21 or later.\n"
}
]
}
}

View File

@ -48,7 +48,7 @@
"description_data": [
{
"lang": "eng",
"value": "When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.\n"
"value": "When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package."
}
]
},
@ -75,12 +75,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html"
"refsource": "MISC",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html",
"name": "https://commons.apache.org/proper/commons-compress/security-reports.html"
},
{
"refsource": "CONFIRM",
"url": "https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E"
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E",
"name": "https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E"
}
]
},
@ -96,4 +98,4 @@
"value": "Commons Compress users should upgrade to 1.21 or later.\n\nWith Compress 1.19 we introduced a feature that tries to recover broken 7z archives, which makes it far easier to exploit this weakness. As a result we have disabled the recovery code by default and users need to enable it explicitly. In addition users are able to control the amount of memory SevenZFile may use and we strongly recommend using this feature when trying to recover broken archives.\n"
}
]
}
}

View File

@ -48,7 +48,7 @@
"description_data": [
{
"lang": "eng",
"value": "When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.\n"
"value": "When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package."
}
]
},
@ -73,12 +73,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html"
"refsource": "MISC",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html",
"name": "https://commons.apache.org/proper/commons-compress/security-reports.html"
},
{
"refsource": "CONFIRM",
"url": "https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E"
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E",
"name": "https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E"
}
]
},
@ -91,4 +93,4 @@
"value": "Commons Compress users should upgrade to 1.21 or later."
}
]
}
}

View File

@ -43,7 +43,7 @@
"description_data": [
{
"lang": "eng",
"value": "When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.\n"
"value": "When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package."
}
]
},
@ -68,12 +68,14 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html"
"refsource": "MISC",
"url": "https://commons.apache.org/proper/commons-compress/security-reports.html",
"name": "https://commons.apache.org/proper/commons-compress/security-reports.html"
},
{
"refsource": "CONFIRM",
"url": "https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E"
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E",
"name": "https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E"
}
]
},
@ -86,4 +88,4 @@
"value": "Commons Compress users should upgrade to 1.21 or later."
}
]
}
}