Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <ff5b6e5e9d40b5cdb6034c7f4ba2e5551d7389e6.camel@debian.org>
Date: Mon, 17 Oct 2022 23:57:45 +0200
From: Markus Koschany <apo@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to
 an integer truncation issue when processing malicious XSLT stylesheets

Hi,

it appears the underlying bug is in Apache Commons bcel and not in Apache Xalan
itself. See

https://bugs.debian.org/1015860

and

https://github.com/apache/commons-bcel/pull/147

https://github.com/apache/commons-bcel/commit/f3267cbcc900f80851d561bdd16b239d936947f5





Download attachment "signature.asc" of type "application/pgp-signature" (964 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.