<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2022-0041</id>
    <title>An update for xerces-j2 is now available for HCE 1.1</title>
    <severity>Moderate</severity>
    <release>HCE 1.1</release>
    <issued date="2022-10-18 09:08:10"/>
    <updated date="2022-10-18 09:08:10"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-23437" id="CVE-2022-23437" title="CVE-2022-23437 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions. (CVE-2022-23437)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="xerces-j2">
        <name>HCE 1.1</name>
        <package arch="noarch" name="xerces-j2" version="2.11.0" release="17.h1.hce1c">
          <filename>xerces-j2-2.11.0-17.h1.hce1c.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
