Bug 2041472 (CVE-2022-21299) - CVE-2022-21299 OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646)
Summary: CVE-2022-21299 OpenJDK: Infinite loop related to incorrect handling of newlin...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-21299
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2039391 2039393 2039394 2039396 2039397 2039588 2040423 2040424 2040425 2040433 2040434 2040435 2040813 2040817 2088330 2093853 2093854
Blocks: 2039369 2047453
TreeView+ depends on / blocked
 
Reported: 2022-01-17 12:44 UTC by Tomas Hoger
Modified: 2023-08-07 09:31 UTC (History)
41 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-01-27 21:00:46 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2022:1527 0 None None None 2022-04-25 15:04:31 UTC
Red Hat Product Errata RHSA-2022:0161 0 None None None 2022-01-19 09:12:36 UTC
Red Hat Product Errata RHSA-2022:0165 0 None None None 2022-01-24 11:40:37 UTC
Red Hat Product Errata RHSA-2022:0166 0 None None None 2022-01-24 11:39:33 UTC
Red Hat Product Errata RHSA-2022:0185 0 None None None 2022-01-24 09:44:43 UTC
Red Hat Product Errata RHSA-2022:0204 0 None None None 2022-01-24 10:11:14 UTC
Red Hat Product Errata RHSA-2022:0209 0 None None None 2022-01-24 09:42:16 UTC
Red Hat Product Errata RHSA-2022:0211 0 None None None 2022-01-24 09:47:07 UTC
Red Hat Product Errata RHSA-2022:0228 0 None None None 2022-01-24 13:03:20 UTC
Red Hat Product Errata RHSA-2022:0229 0 None None None 2022-01-24 13:04:22 UTC
Red Hat Product Errata RHSA-2022:0233 0 None None None 2022-01-24 09:39:06 UTC
Red Hat Product Errata RHSA-2022:0304 0 None None None 2022-01-27 14:05:51 UTC
Red Hat Product Errata RHSA-2022:0305 0 None None None 2022-01-27 14:10:53 UTC
Red Hat Product Errata RHSA-2022:0306 0 None None None 2022-01-27 15:15:47 UTC
Red Hat Product Errata RHSA-2022:0307 0 None None None 2022-01-27 14:17:26 UTC
Red Hat Product Errata RHSA-2022:0312 0 None None None 2022-01-27 16:14:30 UTC
Red Hat Product Errata RHSA-2022:0317 0 None None None 2022-01-27 20:02:19 UTC
Red Hat Product Errata RHSA-2022:0321 0 None None None 2022-01-27 20:00:56 UTC
Red Hat Product Errata RHSA-2022:4918 0 None None None 2022-06-06 15:52:12 UTC
Red Hat Product Errata RHSA-2022:4919 0 None None None 2022-06-06 15:58:37 UTC
Red Hat Product Errata RHSA-2022:4922 0 None None None 2022-06-06 15:11:59 UTC
Red Hat Product Errata RHSA-2022:4957 0 None None None 2022-06-08 12:24:55 UTC

Description Tomas Hoger 2022-01-17 12:44:15 UTC
A flaw was found in the way the XMLEntityScanner and XML11EntityScanner classes in the JAXP component of OpenJDK handled and normalized newlines in XML entities. A specially-crafted XML document could cause a Java application to enter an infinite loop when parsed.

Comment 1 Tomas Hoger 2022-01-18 21:34:32 UTC
Public now via Oracle CPU January 2022:

https://www.oracle.com/security-alerts/cpujan2022.html#AppendixJAVA

Fixed in Oracle Java SE 17.0.2, 11.0.14, 8u321, and 7u331.

Comment 2 errata-xmlrpc 2022-01-19 09:12:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:0161 https://access.redhat.com/errata/RHSA-2022:0161

Comment 7 errata-xmlrpc 2022-01-24 09:39:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:0233 https://access.redhat.com/errata/RHSA-2022:0233

Comment 8 errata-xmlrpc 2022-01-24 09:42:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:0209 https://access.redhat.com/errata/RHSA-2022:0209

Comment 9 errata-xmlrpc 2022-01-24 09:44:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:0185 https://access.redhat.com/errata/RHSA-2022:0185

Comment 10 errata-xmlrpc 2022-01-24 09:47:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:0211 https://access.redhat.com/errata/RHSA-2022:0211

Comment 11 errata-xmlrpc 2022-01-24 10:11:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:0204 https://access.redhat.com/errata/RHSA-2022:0204

Comment 12 errata-xmlrpc 2022-01-24 11:39:30 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.2

Via RHSA-2022:0166 https://access.redhat.com/errata/RHSA-2022:0166

Comment 13 errata-xmlrpc 2022-01-24 11:40:34 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.2

Via RHSA-2022:0165 https://access.redhat.com/errata/RHSA-2022:0165

Comment 14 errata-xmlrpc 2022-01-24 13:03:17 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.14

Via RHSA-2022:0228 https://access.redhat.com/errata/RHSA-2022:0228

Comment 15 errata-xmlrpc 2022-01-24 13:04:20 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.14

Via RHSA-2022:0229 https://access.redhat.com/errata/RHSA-2022:0229

Comment 19 errata-xmlrpc 2022-01-27 14:05:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:0304 https://access.redhat.com/errata/RHSA-2022:0304

Comment 20 errata-xmlrpc 2022-01-27 14:10:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:0305 https://access.redhat.com/errata/RHSA-2022:0305

Comment 21 errata-xmlrpc 2022-01-27 14:17:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:0307 https://access.redhat.com/errata/RHSA-2022:0307

Comment 22 errata-xmlrpc 2022-01-27 15:15:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:0306 https://access.redhat.com/errata/RHSA-2022:0306

Comment 23 errata-xmlrpc 2022-01-27 16:14:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:0312 https://access.redhat.com/errata/RHSA-2022:0312

Comment 24 errata-xmlrpc 2022-01-27 20:00:53 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 8u322

Via RHSA-2022:0321 https://access.redhat.com/errata/RHSA-2022:0321

Comment 25 errata-xmlrpc 2022-01-27 20:02:16 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 8u322

Via RHSA-2022:0317 https://access.redhat.com/errata/RHSA-2022:0317

Comment 26 Product Security DevOps Team 2022-01-27 21:00:43 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-21299

Comment 29 errata-xmlrpc 2022-06-06 15:11:55 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2022:4922 https://access.redhat.com/errata/RHSA-2022:4922

Comment 30 errata-xmlrpc 2022-06-06 15:52:08 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2022:4918 https://access.redhat.com/errata/RHSA-2022:4918

Comment 31 errata-xmlrpc 2022-06-06 15:58:33 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2022:4919 https://access.redhat.com/errata/RHSA-2022:4919

Comment 32 errata-xmlrpc 2022-06-08 12:24:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2022:4957 https://access.redhat.com/errata/RHSA-2022:4957


Note You need to log in before you can comment on or make changes to this bug.