Security home

 

Home / mailingsPDF  

[RHSA-2018:1836-01] Important: plexus-archiver security update

Posted on 12 June 2018
RedHat

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: plexus-archiver security update
Advisory ID: RHSA-2018:1836-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2018:1836
Issue date: 2018-06-12
CVE Names: CVE-2018-1002200
=====================================================================

1. Summary:

An update for plexus-archiver is now available for Red Hat Enterprise Linux
7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - noarch
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch
Red Hat Enterprise Linux Server Optional (v. 7) - noarch
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch

3. Description:

The Plexus project provides a full software stack for creating and
executing software projects. Based on the Plexus container, the
applications can utilise component-oriented programming to build modular,
reusable components that can easily be assembled and reused. The
plexus-archiver component provides functions to create and extract
archives.

Security Fix(es):

* plexus-archiver: arbitrary file write vulnerability / arbitrary code
execution using a specially crafted zip file (CVE-2018-1002200)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Danny Grander (Snyk) for reporting this issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1584392 - CVE-2018-1002200 plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

Source:
plexus-archiver-2.4.2-5.el7_5.src.rpm

noarch:
plexus-archiver-2.4.2-5.el7_5.noarch.rpm
plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1002200
https://access.redhat.com/security/updates/classification/#important
https://snyk.io/research/zip-slip-vulnerability

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.

 

TOP

Mailings :

Exploits :