Is there any public reference to these "vulnerabilities" that we could look
at? Like many such reports,
they seem to be highly... theoretical. For example, this is what I found,
looking around the Web -

https://osv.dev/vulnerability/OSV-2023-696

if you click on the affected range of commits... it makes no sense at all.

A fuzzifier is great but without a reasonable postmortem on a crash and
perhaps a more human-palatable reproducer, it's fairly useless.

Dawid

On Mon, Sep 1, 2025 at 7:49 PM Grégoire Guéret
<ggue...@salesforce.com.invalid> wrote:

> Hello Lucene community team,
>
> As most tech companies do, our security department is performing automated
> vulnerability scans. They identified 2 similar Sonartypes on Lucene, on
> all versions (as far as I know).
>
> I've been wondering if the Lucene team plans to fix them, but could not
> find the information on Lucene's website. Any insight or pointers to
> the proper page would be appreciated.
>
> *sonatype-2025-002050*
> *The lucene package is vulnerable due to an Improper Check for Unusual or
> Exceptional Conditions. The clone() method in the CharTermAttributeImpl
> class does not properly handle exceptional events that may occur during the
> deep clone process. A remote attacker can exploit this vulnerability by
> supplying a crafted termBuffer that, upon being processed by the clone()
> function, will result in an unhandled SecurityException, potentially
> leading to Denial of Service (DoS) or other unexpected behaviors.*
>
> *sonatype-2025-002284*
> *The lucene package is vulnerable due to an Improper Check for Unusual or
> Exceptional Conditions. The normalize() method in the SoraniNormalizer
> class does not properly validate the input buffer and length parameter used
> to normalize Sorani text. A remote attacker can exploit this vulnerability
> by supplying a specially crafted text that results in an invalid value for
> the string buffer or length parameters. This action will cause an
> unexpected exception to be thrown when the delete() operation is performed,
> potentially leading to a Denial of Service (DoS) condition or other
> unexpected behaviors.*
>
> With Regards,
> Gregoire Gueret
>

Reply via email to