vulnerability
SUSE: CVE-2021-36373: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Jul 14, 2021 | Oct 26, 2022 | Oct 26, 2022 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Jul 14, 2021
Added
Oct 26, 2022
Modified
Oct 26, 2022
Description
When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected.
Solutions
suse-upgrade-antsuse-upgrade-ant-antlrsuse-upgrade-ant-apache-bcelsuse-upgrade-ant-apache-bsfsuse-upgrade-ant-apache-log4jsuse-upgrade-ant-apache-orosuse-upgrade-ant-apache-regexpsuse-upgrade-ant-apache-resolversuse-upgrade-ant-apache-xalan2suse-upgrade-ant-commons-loggingsuse-upgrade-ant-commons-netsuse-upgrade-ant-imageiosuse-upgrade-ant-javadocsuse-upgrade-ant-javamailsuse-upgrade-ant-jdependsuse-upgrade-ant-jmfsuse-upgrade-ant-jschsuse-upgrade-ant-junitsuse-upgrade-ant-junit5suse-upgrade-ant-manualsuse-upgrade-ant-scriptssuse-upgrade-ant-swingsuse-upgrade-ant-testutilsuse-upgrade-ant-xz
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.