Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 859394 (CVE-2022-34169) - [Tracker] Remote code execution in dev-java/xalan
Summary: [Tracker] Remote code execution in dev-java/xalan
Alias: CVE-2022-34169
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Depends on: 859397 859400 CVE-2022-38398, CVE-2022-38648, CVE-2022-40146
  Show dependency tree
Reported: 2022-07-19 19:26 UTC by John Helmert III
Modified: 2022-09-25 06:57 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-19 19:26:31 UTC
CVE-2022-34169 (

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

Neither of these references seem to give substantial information on
the vulnerability so I've asked for more info on oss-security.