logo
DATABASE RESOURCES PRICING ABOUT US

Security Bulletin: Multiple Vulnerabilities in Apache Commons Compress affect Liberty for Java for IBM Cloud (CVE-2021-33517, CVE-2021-36090)

Description

## Summary Multiple Vulnerabilities in Apache Commons Compress affect Liberty for Java for IBM Cloud. ## Vulnerability Details ** CVEID: **[CVE-2021-35517](<https://vulners.com/cve/CVE-2021-35517>) ** DESCRIPTION: **Apache Commons Compress is vulnerable to a denial of service, caused by an out of memory error when allocating large amounts of memory. By persuading a victim to open a specially-crafted TAR archive, a remote attacker could exploit this vulnerability to cause a denial of service condition against services that use Compress' tar package. CVSS Base score: 5.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/205307](<https://exchange.xforce.ibmcloud.com/vulnerabilities/205307>) for the current score. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) ** CVEID: **[CVE-2021-36090](<https://vulners.com/cve/CVE-2021-36090>) ** DESCRIPTION: **Apache Commons Compress is vulnerable to a denial of service, caused by an out-of-memory error when large amounts of memory are allocated. By reading a specially-crafted ZIP archive, a remote attacker could exploit this vulnerability to cause a denial of service condition against services that use Compress' zip package. CVSS Base score: 7.5 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/205310](<https://exchange.xforce.ibmcloud.com/vulnerabilities/205310>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) ## Affected Products and Versions These vulnerabilities affect all versions of Liberty for Java in IBM Cloud up to and including v3.61. ## Remediation/Fixes To upgrade to Liberty for Java v3.62-20210922-1852 or higher, you must re-stage or re-push your application To find the current version of Liberty for Java in IBM Cloud being used, from the command-line Cloud Foundry client by running the following commands: cf ssh <appname> -c cat "staging_info.yml" Look for the following lines: {“detected_buildpack”:“Liberty for Java(TM) (WAR, liberty-21.0.0_9, buildpack-v3.62-20210922-1852, ibmjdk-1.8.0_sr6fp36-20210824, env, spring-auto-reconfiguration-1.12.0_RELEASE)“,”start_command”:“.liberty/initial_startup.rb”} To re-stage your application using the command-line Cloud Foundry client, use the following command: cf restage <appname> To re-push your application using the command-line Cloud Foundry client, use the following command: cf push <appname> ## Workarounds and Mitigations None ##


Affected Software


CPE Name Name Version
these vulnerabilities affect any

Related