Bug 1188468 - (CVE-2021-36373) VUL-0: CVE-2021-36373: ant: excessive memory allocation when reading a specially crafted TAR archive
(CVE-2021-36373)
VUL-0: CVE-2021-36373: ant: excessive memory allocation when reading a specia...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Otto Hollmann
Security Team bot
https://smash.suse.de/issue/304000/
CVSSv3.1:SUSE:CVE-2021-36373:5.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-07-19 13:44 UTC by Alexander Bergmann
Modified: 2022-08-26 12:50 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 4 Swamp Workflow Management 2022-04-27 10:19:41 UTC
SUSE-SU-2022:1417-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1188468,1188469
CVE References: CVE-2021-36373,CVE-2021-36374
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    ant-1.9.4-3.9.1, ant-antlr-1.9.4-3.9.1
SUSE Linux Enterprise Server 12-SP5 (src):    ant-1.9.4-3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2022-04-27 10:20:26 UTC
SUSE-SU-2022:1418-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1188468,1188469
CVE References: CVE-2021-36373,CVE-2021-36374
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    ant-1.10.7-150200.4.6.1, ant-antlr-1.10.7-150200.4.6.1, ant-junit-1.10.7-150200.4.6.1, ant-junit5-1.10.7-150200.4.6.1
openSUSE Leap 15.3 (src):    ant-1.10.7-150200.4.6.1, ant-antlr-1.10.7-150200.4.6.1, ant-junit-1.10.7-150200.4.6.1, ant-junit5-1.10.7-150200.4.6.1
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    ant-1.10.7-150200.4.6.1, ant-antlr-1.10.7-150200.4.6.1, ant-junit-1.10.7-150200.4.6.1
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src):    ant-1.10.7-150200.4.6.1, ant-antlr-1.10.7-150200.4.6.1, ant-junit-1.10.7-150200.4.6.1
SUSE Linux Enterprise Module for Development Tools 15-SP3 (src):    ant-1.10.7-150200.4.6.1, ant-antlr-1.10.7-150200.4.6.1, ant-junit-1.10.7-150200.4.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Gianluca Gabrielli 2022-08-26 12:50:37 UTC
Hi Otto, it is actually maintained as you can see from smelt [0] but only on "disabled" channels. That's a little bit cryptic, it actually means that SUSE:SLE-15:Update/ant is only shipped to LTSS products. For LTSS we are only committed on fixing CVE with a CVSS >= 7, so in that case we can skip this codestream.

No additional actions are required from your side, I close the bug.


[0] https://smelt.suse.de/maintained/?q=ant