From 3db3dce9b3ec2066cedc200412f2684c8fa1a6a2 Mon Sep 17 00:00:00 2001
From: Arnout Engelen
Commons Compress may be used to process untrusted input data. + This should not trigger network access, unbounded deserialization + or code execution. It may require processing power proportional to + the size of the input. An input causing an OutOfMemoryError, + StackOverflowError, or another Error may be accepted as a DoS + vulnerability when it is unexpected based on the size of the input + and the resources (RAM, disk, etc) allocated to the process.
+ +Input causing any other RuntimeException is expected and not a + vulnerability, but may be a regular bug when a more appropriate + Exception is available
+ +Regular API parameters are typically designed to work with input + that is either trusted or validated/sanitized by the application + using the library unless otherwise specified, in accordance with + the general + Apache Commons Security Model.
+This page lists all security vulnerabilities fixed in
released versions of Apache Commons Compress. Each
From 3d14d5324a71c0f7b4426f2fdb023d5d0b9756dc Mon Sep 17 00:00:00 2001
From: Gary Gregory Input causing any other RuntimeException is expected and not a
vulnerability, but may be a regular bug when a more appropriate
- Exception is available
Regular API parameters are typically designed to work with input that is either trusted or validated/sanitized by the application