Hehe.  We are not using bzip2 so it doesn't affect us.  But I'll update
to 1.4.1 anyway.

Best Regards,

/Andreas

2012-05-23 16:49, Vincent Massol skrev:
> Funny that this should arrive today in my inbox… ;)
>
> -Vincent
>
> Begin forwarded message:
>
>> From: Stefan Bodewig <[email protected]>
>> Subject: [CVE-2012-2098] Apache Commons Compress and Apache Ant denial of 
>> service vulnerability
>> Date: May 23, 2012 4:00:48 PM GMT+02:00
>> To: [email protected], [email protected], [email protected], 
>> [email protected], [email protected], [email protected], 
>> [email protected], [email protected], David Jorm 
>> <[email protected]>
>>
>> CVE-2012-2098: Apache Commons Compress and Apache Ant denial of service
>>               vulnerability
>>
>> Severity: Low
>>
>> Vendor:
>> The Apache Software Foundation
>>
>> Versions Affected:
>> Apache Commons Compress 1.0 to 1.4
>> Apache Ant 1.5 to 1.8.3
>>
>> Description:
>> The bzip2 compressing streams in Apache Commons Compress and Apache Ant
>> internally use sorting algorithms with unacceptable worst-case
>> performance on very repetitive inputs.  A specially crafted input to
>> Compress' BZip2CompressorOutputStream or Ant's <bzip2> task can be used
>> to make the process spend a very long time while using up all available
>> processing time effectively leading to a denial of service.
>>
>> Mitigation:
>> Commons Compress users should upgrade to 1.4.1
>> Ant users should upgrade to 1.8.4
>>
>> Credit:
>> This issue was discovered by David Jorm of the Red Hat Security Response
>> Team.
>>
>> References:
>> http://commons.apache.org/compress/security.html
>> http://ant.apache.org/security.html
>>
>> Stefan Bodewig
> _______________________________________________
> devs mailing list
> [email protected]
> http://lists.xwiki.org/mailman/listinfo/devs
>

_______________________________________________
devs mailing list
[email protected]
http://lists.xwiki.org/mailman/listinfo/devs

Reply via email to