org.apache.commons:commons-compress@1.16 vulnerabilities

Apache Commons Compress software defines an API for working with compression and archive formats. These include: bzip2, gzip, pack200, lzma, xz, Snappy, traditional Unix Compress, DEFLATE, DEFLATE64, LZ4, Brotli, Zstandard and ar, cpio, jar, tar, zip, dump, 7z, arj.

Direct Vulnerabilities

Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.6,1.21)
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.1,1.21)
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.6,1.21)
  • H
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.0,1.21)
  • H
Denial of Service (DoS)

org.apache.commons:commons-compress is a API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS) due to Uncontrolled Resource Consumption. The file name encoding algorithm can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.19 or higher.

[1.15,1.19)
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, the read method might fail to return the correct EOF indication after the end of the stream has been reached. If it combined with a java.io.InputStreamReader, it can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.18-RC1 or higher.

(,1.18-RC1)