carlosame commented on PR #2:
URL: https://github.com/apache/xalan-java/pull/2#issuecomment-1194029452

   Hello,
   
   I'm the maintainer of [EchoXSL](https://github.com/css4j/echoxsl), a recent 
fork of Apache Xalan-J. I'm happy that the Xalan Project wants to produce an 
additional release with a fix for CVE-2022-34169, however the way it is done in 
this PR would be problematic for modular JDKs.
   
   As explained in css4j/echoxsl#2, the vulnerability belongs in fact to Apache 
BCEL, and Xalan is vulnerable because it bundles an old version of it in the 
jar (together with java-cup etc). However other software do also depend on BCEL 
or java-cup, and in modular projects this would lead to a [split 
packages](https://www.logicbig.com/tutorials/core-java-tutorial/modules/split-packages.html)
 problem. Moreover if you just download the vulnerable BCEL jar file and add 
its packages, Xalan would still be vulnerable.
   
   My suggestion would be to fix the vulnerability in the BCEL project, and 
then set it up as a dependency in Xalan. This is the approach that EchoXSL 
followed and works fine. The resulting Maven POM should include something like 
this in the `dependencies` section:
   
   ```xml
       <dependency>
         <groupId>org.apache.bcel</groupId>
         <artifactId>bcel</artifactId>
         <version>6.5.1</version>
         <scope>compile</scope>
       </dependency>
   ```
   
   Feel free to reuse the Gradle build in EchoXSL if it is of any help.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@xalan.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@xalan.apache.org
For additional commands, e-mail: dev-h...@xalan.apache.org

Reply via email to