Hi,
Just checking, are you interested acquiring the list of attendees? Please 
respond my email. I'm waiting for your response.
Thank you.






-----Original Message-----
From: Mark J. Cox <m...@apache.org> 
Sent: Tuesday, July 19, 2022 11:08 PM
To: annou...@apache.org; dev@xalan.apache.org
Subject: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an 
integer truncation issue when processing malicious XSLT stylesheets 

Description:

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue 
when processing malicious XSLT stylesheets. This can be used to corrupt Java 
class files generated by the internal XSLTC compiler and execute arbitrary Java 
bytecode.

The Apache Xalan Java project is dormant and in the process of being retired. 
No future releases of Apache Xalan Java to address this issue are expected.

Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

Credit:

Reported by Felix Wilhelm, Google Project Zero

References:

https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8

Reply via email to