First published: Tue Jul 09 2024(Updated: )
A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinite loop. This issue also impacts the zipfile module of CPython, as features from the third-party zipp library are later merged into CPython, and the affected code is identical in both projects. The infinite loop can be initiated through the use of functions affecting the `Path` module in both zipp and zipfile, such as `joinpath`, the overloaded division operator, and `iterdir`. Although the infinite loop is not resource exhaustive, it prevents the application from responding. The vulnerability was addressed in version 3.19.1 of jaraco/zipp.
Affected Software | Affected Version | How to fix |
---|---|---|
jaraco zipp | <3.19.1 | |
CPython | <3.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2296413 is considered high due to the potential for Denial of Service (DoS) attacks.
To fix REDHAT-BUG-2296413, upgrade the jaraco/zipp library to version 3.19.1 or higher.
REDHAT-BUG-2296413 affects all versions of the jaraco/zipp library and CPython up to but not including version 3.19.1.
REDHAT-BUG-2296413 is a Denial of Service (DoS) vulnerability.
REDHAT-BUG-2296413 exploits the system by causing an infinite loop when processing a specially crafted zip file.