Описание
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
openjdk-8 | fixed | 8u342-b07-1 | package | |
openjdk-11 | fixed | 11.0.16+8-1 | package | |
openjdk-17 | fixed | 17.0.4+8-1 | package | |
bcel | fixed | 6.5.0-2 | package |
Примечания
https://www.openwall.com/lists/oss-security/2022/07/19/5
https://github.com/openjdk/jdk/commit/41ef2b249073450172e11163a4d05762364b1297
Bug is most likely only in bcel which libxalan2-java depends on.
https://github.com/apache/commons-bcel/pull/147
https://github.com/apache/commons-bcel/commit/f3267cbcc900f80851d561bdd16b239d936947f5
EPSS
Связанные уязвимости
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets
EPSS