Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 859394 (CVE-2022-34169) - [Tracker] Remote code execution in dev-java/xalan
Summary: [Tracker] Remote code execution in dev-java/xalan
Status: CONFIRMED
Alias: CVE-2022-34169
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on: 859397 859400 CVE-2022-38398, CVE-2022-38648, CVE-2022-40146
Blocks:
  Show dependency tree
 
Reported: 2022-07-19 19:26 UTC by John Helmert III
Modified: 2022-09-25 06:57 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-19 19:26:31 UTC
CVE-2022-34169 (https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw):
https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

Neither of these references seem to give substantial information on
the vulnerability so I've asked for more info on oss-security.