First published: Mon Feb 19 2024(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2024-25710">CVE-2024-25710</a> (<a href="https://lists.apache.org/thread/cz8qkcwphy4cx8gltn932ln51cbtq6kf">https://lists.apache.org/thread/cz8qkcwphy4cx8gltn932ln51cbtq6kf</a>): Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.3 through 1.25.0. Users are recommended to upgrade to version 1.26.0 which fixes the issue. <a href="https://access.redhat.com/security/cve/CVE-2024-26308">CVE-2024-26308</a> (<a href="https://lists.apache.org/thread/ch5yo2d21p7vlqrhll9b17otbyq4npfg">https://lists.apache.org/thread/ch5yo2d21p7vlqrhll9b17otbyq4npfg</a>): Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26. Users are recommended to upgrade to version 1.26, which fixes the issue. Please bump to 1.26.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Apache Commons Compress | <1.26 | 1.26 |
maven/org.apache.commons:commons-compress | >=1.21<1.26.0 | 1.26.0 |
Apache Commons Compress | >=1.21<1.26.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-26308 is currently classified as moderate.
To fix CVE-2024-26308, upgrade Apache Commons Compress to version 1.26.0 or later.
CVE-2024-26308 affects Apache Commons Compress versions between 1.21 and 1.26.0, as well as associated products like IBM Security Verify Governance 10.0.2 and earlier.
CVE-2024-26308 represents an infinite loop vulnerability that can lead to denial of service.
As of now, no public exploits for CVE-2024-26308 have been reported.