There’s a vulnerability within the Apache Xerces Java (XercesJ) XML parser
when handling specially crafted XML document payloads. This causes, the
XercesJ XML parser to wait in an infinite loop, which may sometimes consume
system resources for prolonged duration. This vulnerability is present
within XercesJ version 2.12.1 and the previous versions.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libxerces2-java | < any | UNKNOWN |
ubuntu | 20.04 | noarch | libxerces2-java | < any | UNKNOWN |
ubuntu | 22.04 | noarch | libxerces2-java | < any | UNKNOWN |
ubuntu | 23.10 | noarch | libxerces2-java | < any | UNKNOWN |
ubuntu | 24.04 | noarch | libxerces2-java | < any | UNKNOWN |
ubuntu | 14.04 | noarch | libxerces2-java | < any | UNKNOWN |
ubuntu | 16.04 | noarch | libxerces2-java | < any | UNKNOWN |
www.openwall.com/lists/oss-security/2022/01/24/3
launchpad.net/bugs/cve/CVE-2022-23437
lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl
nvd.nist.gov/vuln/detail/CVE-2022-23437
security-tracker.debian.org/tracker/CVE-2022-23437
www.cve.org/CVERecord?id=CVE-2022-23437
www.openwall.com/lists/oss-security/2022/01/24/3