Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 880447 - <dev-java/bcel-6.6.0: remote code execution
Summary: <dev-java/bcel-6.6.0: remote code execution
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa+]
Keywords: PullRequest
Depends on: 880539
Blocks: CVE-2022-34169, CVE-2022-42920
  Show dependency tree
 
Reported: 2022-11-08 19:37 UTC by John Helmert III
Modified: 2024-05-05 08:55 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-08 19:37:48 UTC
CVE-2022-34169:

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

Some details in tracker, seems like the bcel fix is: https://github.com/apache/commons-bcel/commit/f3267cbcc900f80851d561bdd16b239d936947f5

which is in 6.6.0, please stabilize ASAP. Not sure how I missed filing this, sorry about that.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-09 02:43:30 UTC
Thanks!
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-09 03:34:57 UTC
Please cleanup
Comment 3 Larry the Git Cow gentoo-dev 2022-11-09 13:49:39 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6b6c826bc4b8c4398636265b63367f66ced5f8c5

commit 6b6c826bc4b8c4398636265b63367f66ced5f8c5
Author:     Volkmar W. Pogatzki <gentoo@pogatzki.net>
AuthorDate: 2022-11-09 06:44:22 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-11-09 13:49:02 +0000

    dev-java/bcel: CVE-2022-42920, drop 6.5.0, 6.5.0-r3
    
    Bug: https://bugs.gentoo.org/880447
    Signed-off-by: Volkmar W. Pogatzki <gentoo@pogatzki.net>
    Closes: https://github.com/gentoo/gentoo/pull/28198
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 dev-java/bcel/Manifest             |  2 -
 dev-java/bcel/bcel-6.5.0-r3.ebuild | 85 --------------------------------------
 dev-java/bcel/bcel-6.5.0.ebuild    | 31 --------------
 3 files changed, 118 deletions(-)
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-09 13:50:16 UTC
Thank you!
Comment 5 Larry the Git Cow gentoo-dev 2024-05-05 08:54:37 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=c767a7641029f069d1d45e5c732d96ab77a03a45

commit c767a7641029f069d1d45e5c732d96ab77a03a45
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2024-05-05 08:54:04 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2024-05-05 08:54:26 +0000

    [ GLSA 202405-16 ] Apache Commons BCEL: Remote Code Execution
    
    Bug: https://bugs.gentoo.org/880447
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202405-16.xml | 43 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 43 insertions(+)