[ 
https://issues.apache.org/jira/browse/JENA-1364?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16064959#comment-16064959
 ] 

Andy Seaborne commented on JENA-1364:
-------------------------------------

As a workaround, here are two ways to switch to using a different version of 
Xerces with released version of Apache Jena. One way is to re-compile from 
source, the other is to exclude the affected Apache Xerces dependency and 
replace it with another one.

Apache Jena is open source and the source code forms the primary release by the 
project.

Application writers that wish to address this CVE can download the Jena source 
for a specific release and rebuild Apache Jena for their local systems by 
including the Redhat General Release repository and changing the maven property 
that gives the version of Xerces (see jena-parent/pom.xml).

  https://apache.org/dist/jena/

or for previous the archives:

  https://archive.apache.org/dist/jena/

An application writer can exclude the version of Xerces specified in the POM 
files of released Jena maven binary artifacts by using the maven exclusion 
mechanism for dependencies and replacing Xerces 2.11.0 with another version. It 
is likely that the application developer will need to include the Redhat 
General Release repository.

Jena makes use of internal Xerces functions for datatype processing, but not 
internal features for RDF/XML parsing. Modified Xerces 2.11.0 that only 
addresses the CVE should work with Jena - the application writer is urged to 
test compatibility.

{noformat}
    <dependency>
      <groupId>org.apache.jena</groupId>
      <artifactId>apache-jena-libs</artifactId>
      <!-- *** Set Jena version here *** -->
      <version>3.3.0</version>
      <type>pom</type>
      <exclusions>
        <exclusion>
          <groupId>xerces</groupId>
          <artifactId>xercesImpl</artifactId>
        </exclusion>
      </exclusions>
    </dependency>

    <dependency>
      <groupId>xerces</groupId>
      <artifactId>xercesImpl</artifactId>
      <!-- *** Inspect the Redhat repo for exact version number ***
           *** version 2.11.0.SP5-redhat-1
           *** is known to exist at the time of writing
      -->
      <version>????</version>
    </dependency>
{noformat}

   -- Apache Jena PMC


> Jena-core has dependency on vulnerable Xerces version
> -----------------------------------------------------
>
>                 Key: JENA-1364
>                 URL: https://issues.apache.org/jira/browse/JENA-1364
>             Project: Apache Jena
>          Issue Type: Bug
>          Components: Core
>    Affects Versions: Jena 3.3.0
>            Reporter: Yev Bronshteyn
>
> jena-core pulls in Xerces 2.11.0, which has a known vulnerability 
> CVE-2013-4002 (exploitable, resulting in DOS).
> {code}
> [INFO] +- org.apache.jena:apache-jena-libs:pom:3.3.0:compile
> [INFO] |  +- org.apache.jena:jena-tdb:jar:3.3.0:compile
> [INFO] |  |  \- org.apache.jena:jena-arq:jar:3.3.0:compile
> [INFO] |  |     +- org.apache.jena:jena-core:jar:3.3.0:compile
> [INFO] |  |     |  +- xerces:xercesImpl:jar:2.11.0:compile
> {code}
> A potential fix would be to pull in xerces 2.11.0.SP1 or later from one of 
> the Red Hat repositories.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to