We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2022/05/31/2 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2022/06/27/5 | Mailing List Third Party Advisory |
| https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p | Mailing List Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20220722-0004/ | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2022/05/31/2 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2022/06/27/5 | Mailing List Third Party Advisory |
| https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p | Mailing List Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20220722-0004/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2022/05/31/2 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2022/06/27/5 - Mailing List, Third Party Advisory | |
| References | () https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p - Mailing List, Vendor Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20220722-0004/ - Third Party Advisory |
27 Oct 2022, 16:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20220722-0004/ - Third Party Advisory | |
| References | (MLIST) http://www.openwall.com/lists/oss-security/2022/06/27/5 - Mailing List, Third Party Advisory |
22 Jul 2022, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Jun 2022, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
14 Jun 2022, 19:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MLIST) http://www.openwall.com/lists/oss-security/2022/05/31/2 - Mailing List, Third Party Advisory | |
| References | (CONFIRM) https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p - Mailing List, Vendor Advisory | |
| CPE | cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-Other | |
| CVSS |
v2 : v3 : |
v2 : 2.6
v3 : 5.5 |
02 Jun 2022, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3. |
31 May 2022, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-05-31 14:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-30973
Mitre link : CVE-2022-30973
CVE.ORG link : CVE-2022-30973
JSON object : View
Products Affected
apache
- tika
CWE
