Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CABuuzNOonKYSY0afJ0BZyt8+fqY6LUKv8eU6F+t0BJJPTsvymw@mail.gmail.com>
Date: Mon, 24 Jan 2022 18:42:01 +0530
From: Mukul Gandhi <mukulg@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-23437: Infinite loop within Apache XercesJ xml parser

To: oss-security@...ts.openwall.com
Reply-To: j-dev@...ces.apache.org
Subject: CVE-2022-23437: Infinite loop within Apache XercesJ xml parser

Severity: high

Description:

There's a vulnerability within the Apache Xerces Java (XercesJ) XML
parser when handling specially crafted XML document payloads. This
causes, the XercesJ XML parser to wait in an infinite loop, which may
sometimes consume system resources for prolonged duration. This
vulnerability is present within XercesJ version 2.12.1 and the
previous versions.

Mitigation:

Apache XercesJ users, should migrate to version 2.12.2

Credit:

This issue was discovered by Sergey Temnikov and Ziyi Luo, from Amazon
Corretto/JDK Team

References:
https://markmail.org/message/vcmhwbuorfgcdr6l


-- 
Regards,
Mukul Gandhi

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.