Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b449ea7c-4709-b624-3563-dbc3d2c9a9ab@apache.org>
Date: Tue, 04 Jul 2023 12:16:34 +0000
From: Arnout Engelen <engelen@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-34150: Apache Any23: Possible excessive allocation of
 resources reading input. 

Affected versions:

- Apache Any23 through 2.7

Description:

** UNSUPPORTED WHEN ASSIGNED ** Use of TikaEncodingDetector in Apache Any23 can cause excessive memory usage.

Credit:

Liran Mendelovich (finder)

References:

https://attic.apache.org/projects/any23.html
https://www.cve.org/CVERecord?id=CVE-2023-34150

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.