Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 201604-02 ] Xalan-Java
View unanswered posts
View posts from last 24 hours

Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message

Joined: 12 May 2004
Posts: 2308

PostPosted: Sat Apr 02, 2016 8:26 pm    Post subject: [ GLSA 201604-02 ] Xalan-Java Reply with quote

Gentoo Linux Security Advisory

Title: Xalan-Java: Arbitrary code execution (GLSA 201604-02)
Severity: normal
Exploitable: remote
Date: April 02, 2016
Bug(s): #505602
ID: 201604-02


Insufficient constraints in Apache's Xalan-Java might allow remote
attackers to execute arbitrary code and load arbitrary classes.


Xalan-Java is an XSLT processor for transforming XML documents into
HTML, text, or other XML document types.

Affected Packages

Package: dev-java/xalan
Vulnerable: < 2.7.2
Unaffected: >= 2.7.2
Architectures: All supported architectures


The TransformerFactory in Apache Xalan-Java does not properly restrict
access to certain properties when FEATURE_SECURE_PROCESSING is enabled.
This can also be exploited via a Java property that is bound to the XSLT
1.0 system-property function.


A remote attacker could inject specially crafted XSLT properties
resulting in the execution of arbitrary code with the privileges of the


There is no known work around at this time.


All Xalan-Java users should upgrade to the latest version:
# emerge --sync
      # emerge --ask --oneshot --verbose ">=dev-java/xalan-2.7.2"


Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum