-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: plexus-archiver security update Advisory ID: RHSA-2018:1836-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1836 Issue date: 2018-06-12 CVE Names: CVE-2018-1002200 ===================================================================== 1. Summary: An update for plexus-archiver is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch 3. Description: The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives. Security Fix(es): * plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Danny Grander (Snyk) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1584392 - CVE-2018-1002200 plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: plexus-archiver-2.4.2-5.el7_5.src.rpm noarch: plexus-archiver-2.4.2-5.el7_5.noarch.rpm plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: plexus-archiver-2.4.2-5.el7_5.src.rpm noarch: plexus-archiver-2.4.2-5.el7_5.noarch.rpm plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: plexus-archiver-2.4.2-5.el7_5.src.rpm noarch: plexus-archiver-2.4.2-5.el7_5.noarch.rpm plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): Source: plexus-archiver-2.4.2-5.el7_5.src.rpm noarch: plexus-archiver-2.4.2-5.el7_5.noarch.rpm plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): Source: plexus-archiver-2.4.2-5.el7_5.src.rpm noarch: plexus-archiver-2.4.2-5.el7_5.noarch.rpm plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-1002200 https://access.redhat.com/security/updates/classification/#important https://snyk.io/research/zip-slip-vulnerability 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBWx/dJ9zjgjWX9erEAQglMw//S++K6QovQX+CKEbQVSAcx57aYAGHqNDJ X4/dPpwPf5IcHqusNqZY8eO0Btqs/4DKz2p1a3SGJTYrwhO7kMFsUbs+lqCBDMBn ONT4jws5JmNUCTwtBR3M9EPdyqZ4jTSM2+v/bgR9jiSVBK/3i0t/inPnSFHpPjLA yewa72dQ/KgMakzqgSGghUrLO9/L6x2NWc+FrV1iz0NDHh2FeQiP0FbXx9fU/8Mw zg8ISlkFJ3tSSNpMCKyNgu0FVkNGigOmZoQz/amIA2taHjeuOsqWVJPW4lEISliu fmkXP+M/6SXhdHiJSWNeYPR7hikepF4yQnctx8dg/gJeKnYsZE8/BkjSy7KkXjfV P/7lKLvN4J5gpy4OgiFqUwxN0OQ/UsCFNuy/NXS90hyrGFIv6+7LUjo8mrZ+OQL1 x9Gqkuvvyat/mdw5lQtGBidyGf3wOE2jvxRsncWSenkCGMwEitT7Ymw/NkNRWZh6 Jd887rDFtbY3KjWHtW8YE/mqaVmAXovrR1pDFrvnXVldpZ3JDML862oz/xI8Nl4x kHvtUABh/jkaMq34/eN76mefhD+xVPh6+OoJvhlF4Mq+rS3a73gipkgQrJRX8eE4 QKdhUZ/ajbfBd3pRMKsyzVFRmBg2IlrOFqk7rlxVDNM6vykFvpuyFTiZ59fwo4OF KKsgQEY2Ehg= =Vfgj -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce