Bug 1199604 - (CVE-2022-30126) VUL-0: CVE-2022-30126: tika-core: Regular Expression Denial of Service in Standards Extractor
(CVE-2022-30126)
VUL-0: CVE-2022-30126: tika-core: Regular Expression Denial of Service in Sta...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/331929/
CVSSv3.1:SUSE:CVE-2022-30126:5.9:(AV:...
:
Depends on: CVE-2022-30973
Blocks:
  Show dependency treegraph
 
Reported: 2022-05-17 08:28 UTC by Hu
Modified: 2022-12-20 11:20 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-05-17 08:28:17 UTC
CVE-2022-30126

In Apache Tika, a regular expression in our StandardsText class, used by the
StandardsExtractingContentHandler could lead to a denial of service caused by
backtracking on a specially crafted file. This only affects users who are
running the StandardsExtractingContentHandler, which is a non-standard handler.
This is fixed in 1.28.2 and 2.4.0

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-30126
https://seclists.org/oss-sec/2022/q2/104
http://www.openwall.com/lists/oss-security/2022/05/16/3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30126
https://lists.apache.org/thread/dh3syg68nxogbmlg13srd6gjn3h2z6r4
Comment 1 Hu 2022-05-17 08:29:12 UTC
I think this could be the fix, but I am not 100% sure: 
https://github.com/apache/tika/commit/83b0de4d60161ebd4bc224141a959ac8c18d95f4

Affected:
 - SUSE:SLE-15-SP2:Update:Products:Manager41:Update/tika-core   1.26
 - SUSE:SLE-15-SP3:Update:Products:Manager42:Update/tika-core   1.26
 - SUSE:SLE-15-SP4:Update:Products:Manager43:Update/tika-core   1.26
Comment 2 Michael Calmer 2022-05-17 13:42:03 UTC
(In reply to Hu from comment #1)
> I think this could be the fix, but I am not 100% sure: 
> https://github.com/apache/tika/commit/
> 83b0de4d60161ebd4bc224141a959ac8c18d95f4

I think this is not the fix. It is not available in 1.28.2 and they state that, that version fix it. I do not see any code change in that release. I wonder if that version really fixes anything.
Comment 3 Hu 2022-05-17 16:05:46 UTC
Okay, I will ask in the tika mailinglist. Will report back.
Comment 6 Hu 2022-07-05 08:28:46 UTC
Upstream got a new CVE for the incomplete fix: CVE-2022-30126 

A new bug was opened for the new CVE: bnc#1200283
Comment 7 Michael Calmer 2022-08-21 17:01:10 UTC
If I got ist right  CVE-2022-30973 and CVE-2022-30126 is the same.
I submitted an update to 4.1 and 4.2

4.3 is not affected. This package was never shipped on a product
Comment 8 Michael Calmer 2022-08-21 17:02:47 UTC
assign to security team for tracking
Comment 10 Swamp Workflow Management 2022-09-19 19:26:44 UTC
SUSE-SU-2022:3310-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 1199604,1200283,1201217
CVE References: CVE-2022-30126,CVE-2022-30973,CVE-2022-33879
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for SUSE Manager Server 4.2 (src):    tika-core-1.26-150300.4.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2022-09-19 19:37:18 UTC
SUSE-SU-2022:3311-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 1199604,1200283,1201217
CVE References: CVE-2022-30126,CVE-2022-30973,CVE-2022-33879
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for SUSE Manager Server 4.1 (src):    tika-core-1.26-150200.3.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Hu 2022-12-20 11:20:59 UTC
done