Source: libxalan2-java X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security
Hi, The following vulnerability was published for libxalan2-java. CVE-2022-34169[0]: | The Apache Xalan Java XSLT library is vulnerable to an integer | truncation issue when processing malicious XSLT stylesheets. This can | be used to corrupt Java class files generated by the internal XSLTC | compiler and execute arbitrary Java bytecode. The Apache Xalan Java | project is dormant and in the process of being retired. No future | releases of Apache Xalan Java to address this issue are expected. | Note: Java runtimes (such as OpenJDK) include repackaged copies of | Xalan. https://www.openwall.com/lists/oss-security/2022/07/19/5 The patch in the openjdk-internal version seems to be https://github.com/openjdk/jdk/commit/41ef2b249073450172e11163a4d05762364b1297 so that might be potential way to fix this. Given the package is retired by Apache we should however also work to get it removed from Debian? If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-34169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169 Please adjust the affected versions in the BTS as needed.