[ https://issues.apache.org/jira/browse/XALANJ-2792?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Joshua Marquart updated XALANJ-2792: ------------------------------------ Attachment: xalanj-2792-20241213a.patch > XALAN JAXP still vulnerable to CVE-2019-2981 > -------------------------------------------- > > Key: XALANJ-2792 > URL: https://issues.apache.org/jira/browse/XALANJ-2792 > Project: XalanJ2 > Issue Type: Bug > Security Level: No security risk; visible to anyone(Ordinary problems in > Xalan projects. Anybody can view the issue.) > Components: JAXP > Affects Versions: 2.7.3 > Reporter: Joshua Marquart > Priority: Minor > Attachments: xalanj-2792-20241213a.patch > > > Recent Sonatype Lifecycle scans of Xalan 2.7.3 (and Xalan servicemix 2.7.3_3) > are being flagged as having LOW vulnerability CVE-2019-2981 due to improper > error handling within JAXP classes. > org.apache.xpath.compiler.Compiler will throw an unchecked StackOverflowError > under certain conditions. > Per the CVE summary, this has already been resolved by certain JRE releases > of JAXP, however cursory review of the existing releases of the classes from > Xalan show the compensating code was not applied to Xalan's embedded JAXP > classes and therefore have the potential to throw a StackOverflowError. > > RedHat, for example, resolved it with their JRE per > [https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-2981] / > [https://hg.openjdk.org/jdk8u/jdk8u/jaxp/rev/6f9c0c731ab7] > OpenJDK resolved it here: > [https://linux.oracle.com/errata/ELSA-2019-3128.html] > > *Description from CVE* > Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE > (component: JAXP). Supported versions that are affected are Java SE: 7u231, > 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit > vulnerability allows unauthenticated attacker with network access via > multiple protocols to compromise Java SE, Java SE Embedded. Successful > attacks of this vulnerability can result in unauthorized ability to cause a > partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: > This vulnerability applies to Java deployments, typically in clients running > sandboxed Java Web Start applications or sandboxed Java applets (in Java SE > 8), that load and run untrusted code (e.g., code that comes from the > internet) and rely on the Java sandbox for security. This vulnerability can > also be exploited by using APIs in the specified Component, e.g., through a > web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 > (Availability impacts). CVSS Vector: > (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). > *Explanation* > Certain components within OpenJDK versions 7, 8, etc. are vulnerable to > improper handling of exceptions. Under some cases, an unauthenticated > attacker may be able to exploit this vulnerability to trigger a partial > Denial of Service (DoS). > {_}Vulnerable File(s) and Function(s){_}: > jdk8u/jaxp/org/apache/xpath/external/XPath.class > jdk8u/jaxp/org/apache/xpath/external/compiler/Compiler.class > jdk8u/jaxp/org/apache/xpath/external/axes/WalkerFactory.class > jdk8u/jaxp/org/apache/xpath/external/axes/FilterExprWalker.class > jdk7u/jaxp/org/apache/xpath/external/compiler/Compiler.class > jdk7u/jaxp/org/apache/xpath/external/XPath.class > jdk7u/jaxp/org/apache/xpath/external/axes/FilterExprWalker.class > jdk7u/jaxp/org/apache/xpath/external/axes/WalkerFactory.class -- This message was sent by Atlassian Jira (v8.20.10#820010) --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@xalan.apache.org For additional commands, e-mail: dev-h...@xalan.apache.org