This is an automated email from the ASF dual-hosted git repository.

elharo pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/xerces-j.git


The following commit(s) were added to refs/heads/main by this push:
     new c41d49b36 Add explicit statement around CVE-2017-7503 (#9)
c41d49b36 is described below

commit c41d49b360d27df220da4de1da1864098fc64e6e
Author: Arnout Engelen <[email protected]>
AuthorDate: Fri Jun 20 21:15:15 2025 +0200

    Add explicit statement around CVE-2017-7503 (#9)
---
 docs/security.xml | 9 +++++++++
 1 file changed, 9 insertions(+)

diff --git a/docs/security.xml b/docs/security.xml
index deb967090..020c482d1 100644
--- a/docs/security.xml
+++ b/docs/security.xml
@@ -31,5 +31,14 @@ If you think you have found a security issue in Apache 
Xerces, please follow the
 Results from source code security analyzers are not accepted without 
additional analysis showing that the problem indeed violates the project's 
security model, as such tools commonly produce many false positives.
 </p>
 
+</s2>
+<s2 title="CVE-2017-7503">
+<p>
+In 2017, Red Hat published <jump 
href="https://www.cve.org/CVERecord?id=CVE-2017-7503";>CVE-2017-7503</jump>.
+Note that they do not mark Xerces as affected, only their own 'JBoss 
Enterprise Application Platform'.
+Sadly, the exact specifics of the issue appear to have been lost to time.
+It looks like it's simply describing that options for features like loading 
external entities and DTDs are enabled by default, which we (as documented 
above) consider expected and well-known behavior.
+Possibly JBoss did not correctly take this into account at the time.
+</p>
 </s2>
 </s1>


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to