
9/7/2024

9/7/2024

9/7/2024

1/4/2025
CVE-2024-5569: Denial of Service via crafted zip file in jaraco/zipp
First published: Tue Jul 09 2024(Updated: )
A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the `Path` module in both zipp and zipfile, such as `joinpath`, the overloaded division operator, and `iterdir`. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|
pip/zipp | <3.19.1 | 3.19.1 |
debian/python-zipp | <=1.0.0-3<=1.0.0-6 | 3.20.1-1 |
IBM Rational Team Concert | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1, 1.0.3 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Parent vulnerabilities
(Appears in the following advisories)
Frequently Asked Questions
What is the severity of CVE-2024-5569?
CVE-2024-5569 has a medium severity due to its potential to cause Denial of Service.
How do I fix CVE-2024-5569?
To fix CVE-2024-5569, upgrade the zipp library to version 3.19.1 or later.
Which versions are affected by CVE-2024-5569?
CVE-2024-5569 affects all versions of the jaraco/zipp library prior to 3.19.1.
Does CVE-2024-5569 affect any specific software products?
Yes, CVE-2024-5569 affects products using the zipp library, including IBM Concert Software versions 1.0.0 to 1.0.3.
What are the potential impacts of CVE-2024-5569?
The potential impacts of CVE-2024-5569 include application crashes or an infinite loop leading to Denial of Service.
- agent/weakness
- agent/title
- agent/type
- agent/author
- collector/nvd-api
- source/NVD
- collector/nvd-cve
- agent/remedy
- agent/first-publish-date
- collector/epss-latest
- source/FIRST
- agent/epss
- collector/mitre-cve
- source/MITRE
- collector/github-advisory-latest
- source/GitHub
- alias/GHSA-jfmj-5v4g-7637
- alias/CVE-2024-5569
- agent/software-canonical-lookup
- collector/github-advisory
- collector/security-tracker-debian
- source/Debian
- agent/severity
- collector/usn-cve
- source/Ubuntu
- agent/event
- collector/redhat-bugzilla
- source/Red Hat
- agent/trending
- agent/references
- agent/last-modified-date
- agent/description
- agent/source
- agent/softwarecombine
- agent/tags
- collector/ibm-support
- source/IBM
- package-manager/pip
- package-manager/debian
- vendor/ibm
- canonical/ibm rational team concert
- version/ibm rational team concert/1.0.0, 1.0.1, 1.0.2, 1.0.2.1, 1.0.3
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203