org.apache.commons:commons-compress@1.8 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.commons:commons-compress package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Infinite loop

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Infinite loop due to the improper handling of certain inputs during the parsing of dump files. An attacker can cause the application to enter an infinite loop by supplying crafted inputs.

How to fix Infinite loop?

Upgrade org.apache.commons:commons-compress to version 1.26.0 or higher.

[1.3,1.26.0)
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.6,1.21)
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.1,1.21)
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.6,1.21)
  • H
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.21 or higher.

[1.0,1.21)
  • M
Denial of Service (DoS)

org.apache.commons:commons-compress is an API for working with compression and archive formats.

Affected versions of this package are vulnerable to Denial of Service (DoS). When reading a specially crafted ZIP archive, the read method might fail to return the correct EOF indication after the end of the stream has been reached. If it combined with a java.io.InputStreamReader, it can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.

How to fix Denial of Service (DoS)?

Upgrade org.apache.commons:commons-compress to version 1.18-RC1 or higher.

[,1.18-RC1)