Bug 1221413 (CVE-2012-2098) - VUL-0: CVE-2012-2098: ant,apache-commons-compress: Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a den ...
Summary: VUL-0: CVE-2012-2098: ant,apache-commons-compress: Algorithmic complexity vul...
Status: RESOLVED FIXED
Alias: CVE-2012-2098
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/52329/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-03-14 14:29 UTC by SMASH SMASH
Modified: 2024-06-07 13:31 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-03-14 14:29:14 UTC
Algorithmic complexity vulnerability in the sorting algorithms in bzip2
compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress
before 1.4.1 allows remote attackers to cause a denial of service (CPU
consumption) via a file with many repeating inputs.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2098
https://www.cve.org/CVERecord?id=CVE-2012-2098
http://xforce.iss.net/xforce/xfdb/75857
http://www.securitytracker.com/id?1027096
http://www.securityfocus.com/bid/53676
http://secunia.com/advisories/49286
http://secunia.com/advisories/49255
http://packetstormsecurity.org/files/113014/Apache-Commons-Compress-Apache-Ant-Denial-Of-Service.html
http://osvdb.org/82161
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081746.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081697.html
http://commons.apache.org/compress/security.html
http://archives.neohapsis.com/archives/bugtraq/2012-05/0130.html
http://ant.apache.org/security.html
https://bugzilla.redhat.com/show_bug.cgi?id=810406
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105060.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105049.html
http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-2098.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/75857
https://access.redhat.com/security/cve/CVE-2012-2098
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E
http://www-01.ibm.com/support/docview.wss?uid=swg21644047
https://www.oracle.com/security-alerts/cpujan2021.html
http://www.openwall.com/lists/oss-security/2023/09/13/3
https://bugs.openjdk.org/browse/JDK-6560193
https://www.cve.org/CVERecord?id=CVE-2023-42503
https://seclists.org/oss-sec/2023/q3/177
Comment 1 Fridrich Strba 2024-03-18 13:12:45 UTC
This is pretty old stuff. Do we really have something vulnerable? The version in sle15sp2 is patched since ages.
Comment 2 Gabriele Sonnu 2024-06-07 13:31:47 UTC
All done, closing.