First published: Tue Jul 19 2022(Updated: )
An integer truncation issue was found in the Xalan Java XSLT library when processing malicious stylesheets. This flaw could be used to potentially execute arbitrary Java bytecode.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/bcel | <=6.2-1 | 6.2-1+deb10u1 6.5.0-1+deb11u1 6.5.0-2 |
debian/openjdk-11 | 11.0.16+8-1~deb10u1 11.0.21+9-1~deb10u1 11.0.20+8-1~deb11u1 11.0.21+9-1~deb11u1 11.0.21+9-1 | |
debian/openjdk-17 | 17.0.7+7-1~deb11u1 17.0.8+7-1~deb12u1 17.0.9+9-1 | |
debian/openjdk-8 | 8u392-ga-1 | |
maven/xalan:xalan | <2.7.3 | 2.7.3 |
Apache Xalan-Java | <=2.7.2 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Oracle GraalVM | =20.3.6 | |
Oracle GraalVM | =21.3.2 | |
Oracle GraalVM | =22.1.0 | |
Oracle JDK | =1.7.0-update343 | |
Oracle JDK | =1.8.0-update333 | |
Oracle JDK | =11.0.15.1 | |
Oracle JDK | =17.0.3.1 | |
Oracle JDK | =18.0.1.1 | |
Oracle JRE | =1.7.0-update343 | |
Oracle JRE | =1.8.0-update333 | |
Oracle JRE | =11.0.15.1 | |
Oracle JRE | =17.0.3.1 | |
Oracle JRE | =18.0.1.1 | |
Oracle OpenJDK | >=11<=11.0.15 | |
Oracle OpenJDK | >=13<=13.0.11 | |
Oracle OpenJDK | >=15<=15.0.7 | |
Oracle OpenJDK | >=17<=17.0.3 | |
Oracle OpenJDK | =7 | |
Oracle OpenJDK | =7-update1 | |
Oracle OpenJDK | =7-update10 | |
Oracle OpenJDK | =7-update101 | |
Oracle OpenJDK | =7-update11 | |
Oracle OpenJDK | =7-update111 | |
Oracle OpenJDK | =7-update121 | |
Oracle OpenJDK | =7-update13 | |
Oracle OpenJDK | =7-update131 | |
Oracle OpenJDK | =7-update141 | |
Oracle OpenJDK | =7-update15 | |
Oracle OpenJDK | =7-update151 | |
Oracle OpenJDK | =7-update161 | |
Oracle OpenJDK | =7-update17 | |
Oracle OpenJDK | =7-update171 | |
Oracle OpenJDK | =7-update181 | |
Oracle OpenJDK | =7-update191 | |
Oracle OpenJDK | =7-update2 | |
Oracle OpenJDK | =7-update201 | |
Oracle OpenJDK | =7-update21 | |
Oracle OpenJDK | =7-update211 | |
Oracle OpenJDK | =7-update221 | |
Oracle OpenJDK | =7-update231 | |
Oracle OpenJDK | =7-update241 | |
Oracle OpenJDK | =7-update25 | |
Oracle OpenJDK | =7-update251 | |
Oracle OpenJDK | =7-update261 | |
Oracle OpenJDK | =7-update271 | |
Oracle OpenJDK | =7-update281 | |
Oracle OpenJDK | =7-update291 | |
Oracle OpenJDK | =7-update3 | |
Oracle OpenJDK | =7-update301 | |
Oracle OpenJDK | =7-update311 | |
Oracle OpenJDK | =7-update321 | |
Oracle OpenJDK | =7-update4 | |
Oracle OpenJDK | =7-update40 | |
Oracle OpenJDK | =7-update45 | |
Oracle OpenJDK | =7-update5 | |
Oracle OpenJDK | =7-update51 | |
Oracle OpenJDK | =7-update55 | |
Oracle OpenJDK | =7-update6 | |
Oracle OpenJDK | =7-update60 | |
Oracle OpenJDK | =7-update65 | |
Oracle OpenJDK | =7-update67 | |
Oracle OpenJDK | =7-update7 | |
Oracle OpenJDK | =7-update72 | |
Oracle OpenJDK | =7-update76 | |
Oracle OpenJDK | =7-update80 | |
Oracle OpenJDK | =7-update85 | |
Oracle OpenJDK | =7-update9 | |
Oracle OpenJDK | =7-update91 | |
Oracle OpenJDK | =7-update95 | |
Oracle OpenJDK | =7-update97 | |
Oracle OpenJDK | =7-update99 | |
Oracle OpenJDK | =8 | |
Oracle OpenJDK | =8-milestone1 | |
Oracle OpenJDK | =8-milestone2 | |
Oracle OpenJDK | =8-milestone3 | |
Oracle OpenJDK | =8-milestone4 | |
Oracle OpenJDK | =8-milestone5 | |
Oracle OpenJDK | =8-milestone6 | |
Oracle OpenJDK | =8-milestone7 | |
Oracle OpenJDK | =8-milestone8 | |
Oracle OpenJDK | =8-milestone9 | |
Oracle OpenJDK | =8-update101 | |
Oracle OpenJDK | =8-update102 | |
Oracle OpenJDK | =8-update11 | |
Oracle OpenJDK | =8-update111 | |
Oracle OpenJDK | =8-update112 | |
Oracle OpenJDK | =8-update121 | |
Oracle OpenJDK | =8-update131 | |
Oracle OpenJDK | =8-update141 | |
Oracle OpenJDK | =8-update151 | |
Oracle OpenJDK | =8-update152 | |
Oracle OpenJDK | =8-update161 | |
Oracle OpenJDK | =8-update162 | |
Oracle OpenJDK | =8-update171 | |
Oracle OpenJDK | =8-update172 | |
Oracle OpenJDK | =8-update181 | |
Oracle OpenJDK | =8-update191 | |
Oracle OpenJDK | =8-update192 | |
Oracle OpenJDK | =8-update20 | |
Oracle OpenJDK | =8-update201 | |
Oracle OpenJDK | =8-update202 | |
Oracle OpenJDK | =8-update211 | |
Oracle OpenJDK | =8-update212 | |
Oracle OpenJDK | =8-update221 | |
Oracle OpenJDK | =8-update222 | |
Oracle OpenJDK | =8-update231 | |
Oracle OpenJDK | =8-update232 | |
Oracle OpenJDK | =8-update241 | |
Oracle OpenJDK | =8-update242 | |
Oracle OpenJDK | =8-update25 | |
Oracle OpenJDK | =8-update252 | |
Oracle OpenJDK | =8-update262 | |
Oracle OpenJDK | =8-update271 | |
Oracle OpenJDK | =8-update281 | |
Oracle OpenJDK | =8-update282 | |
Oracle OpenJDK | =8-update291 | |
Oracle OpenJDK | =8-update301 | |
Oracle OpenJDK | =8-update302 | |
Oracle OpenJDK | =8-update31 | |
Oracle OpenJDK | =8-update312 | |
Oracle OpenJDK | =8-update322 | |
Oracle OpenJDK | =8-update332 | |
Oracle OpenJDK | =8-update40 | |
Oracle OpenJDK | =8-update45 | |
Oracle OpenJDK | =8-update5 | |
Oracle OpenJDK | =8-update51 | |
Oracle OpenJDK | =8-update60 | |
Oracle OpenJDK | =8-update65 | |
Oracle OpenJDK | =8-update66 | |
Oracle OpenJDK | =8-update71 | |
Oracle OpenJDK | =8-update72 | |
Oracle OpenJDK | =8-update73 | |
Oracle OpenJDK | =8-update74 | |
Oracle OpenJDK | =8-update77 | |
Oracle OpenJDK | =8-update91 | |
Oracle OpenJDK | =8-update92 | |
Oracle OpenJDK | =18 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
NetApp 7-Mode Transition Tool | ||
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp Cloud Insights Acquisition Unit | ||
Netapp Cloud Secure Agent | ||
Netapp Hci Management Node | ||
NetApp OnCommand Insight | ||
Netapp Solidfire | ||
Netapp Hci Compute Node | ||
Azul Zulu | =6.47 | |
Azul Zulu | =7.54 | |
Azul Zulu | =8.62 | |
Azul Zulu | =11.56 | |
Azul Zulu | =13.48 | |
Azul Zulu | =15.40 | |
Azul Zulu | =17.34 | |
Azul Zulu | =18.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34169 is a vulnerability in the Apache Xalan Java XSLT library that allows a remote attacker to execute arbitrary code on the system.
CVE-2022-34169 can be exploited by processing malicious XSLT stylesheets, leading to the corruption of Java class files and the execution of arbitrary Java bytecode.
CVE-2022-34169 has a severity rating of 7.5 (high).
The following software versions are affected by CVE-2022-34169: Apache Xalan Java XSLT library versions up to 2.7.2, OpenJDK 11 versions up to 11.0.17, OpenJDK 17 versions up to 17.0.5, and IBM Security Verify Governance versions up to 10.0.
To mitigate CVE-2022-34169, users are recommended to update to Apache Xalan Java XSLT library version 2.7.3 or later. Additionally, update OpenJDK 11 to versions 11.0.18 or later, OpenJDK 17 to versions 17.0.6 or later, and IBM Security Verify Governance to version 10.0.1 or later.