First published: Mon Oct 05 2020(Updated: )
It was discovered that Apache Tika can have an excessive memory usage by using a crafted or corrupt PSD file. An attacker could use it to cause a denial of service (crash). (CVE-2020-1950, CVE-2020-1951)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libtika-java | <1.5-4ubuntu0.1 | 1.5-4ubuntu0.1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Apache Tika vulnerabilities is USN-4564-1.
The Apache Tika vulnerabilities can cause excessive memory usage and denial of service (crash).
An attacker can exploit these vulnerabilities by using a crafted or corrupt PSD file.
The recommended version of the libtika-java package to fix the vulnerabilities is 1.5-4ubuntu0.1.
You can find more information about the Apache Tika vulnerabilities at the following references: [CVE-2020-1951](https://ubuntu.com/security/CVE-2020-1951), [CVE-2020-1950](https://ubuntu.com/security/CVE-2020-1950), [launchpad.net](https://launchpad.net/ubuntu/+source/tika/1.5-4ubuntu0.1).