oss-sec mailing list archives
Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets
From: John Helmert III <ajak () gentoo org>
Date: Tue, 19 Jul 2022 14:21:40 -0500
On Tue, Jul 19, 2022 at 05:37:46PM +0000, Mark J. Cox wrote:
Description: The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan. Credit: Reported by Felix Wilhelm, Google Project Zero References: https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
Hi, is there any available patch or bug report? The reference here only seems to be a discussion of the retirement of xalan-j, rather than the vulnerability.
Attachment:
signature.asc
Description:
Current thread:
- CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets Mark J. Cox (Jul 19)
- Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets John Helmert III (Jul 19)
- Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets Roxana Bradescu (Jul 20)
- Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets Moritz Muehlenhoff (Jul 20)
- Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets John Helmert III (Jul 19)