When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.

Project Subscriptions

Vendors Products
Commons Compress Subscribe
Active Iq Unified Manager Subscribe
Oncommand Insight Subscribe
Banking Digital Experience Subscribe
Banking Enterprise Default Management Subscribe
Banking Party Management Subscribe
Banking Payments Subscribe
Banking Trade Finance Subscribe
Banking Treasury Management Subscribe
Business Process Management Suite Subscribe
Commerce Guided Search Subscribe
Communications Billing And Revenue Management Subscribe
Communications Cloud Native Core Automated Test Suite Subscribe
Communications Cloud Native Core Service Communication Proxy Subscribe
Communications Cloud Native Core Unified Data Repository Subscribe
Communications Diameter Intelligence Hub Subscribe
Communications Messaging Server Subscribe
Communications Session Route Manager Subscribe
Financial Services Crime And Compliance Management Studio Subscribe
Financial Services Enterprise Case Management Subscribe
Flexcube Universal Banking Subscribe
Healthcare Data Repository Subscribe
Insurance Policy Administration Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Primavera Unifier Subscribe
Utilities Testing Accelerator Subscribe
Jboss Fuse Subscribe
Rhev Manager Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1620 When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
Github GHSA Github GHSA GHSA-7hfm-57qf-j43q Excessive Iteration in Compress
Fixes

Solution

No solution given by the vendor.


Workaround

Commons Compress users should upgrade to 1.21 or later.

References
Link Providers
http://www.openwall.com/lists/oss-security/2021/07/13/1 cve-icon cve-icon cve-icon
https://commons.apache.org/proper/commons-compress/security-reports.html cve-icon cve-icon cve-icon
https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E cve-icon cve-icon cve-icon
https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b%40%3Cdev.poi.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040%40%3Cnotifications.skywalking.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae%40%3Cnotifications.skywalking.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c%40%3Cnotifications.skywalking.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee%40%3Cnotifications.skywalking.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a%40%3Cnotifications.skywalking.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbaea15ddc5a7c0c6b66660f1d6403b28595e2561bb283eade7d7cd69%40%3Cannounce.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e%40%3Cnotifications.skywalking.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742%40%3Cnotifications.skywalking.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-35515 cve-icon
https://security.netapp.com/advisory/ntap-20211022-0001/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-35515 cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T00:40:47.264Z

Reserved: 2021-06-27T00:00:00

Link: CVE-2021-35515

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-13T08:15:07.033

Modified: 2024-11-21T06:12:25.177

Link: CVE-2021-35515

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-07-13T00:00:00Z

Links: CVE-2021-35515 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses