This is an automated email from the ASF dual-hosted git repository. jleroux pushed a commit to branch release18.12 in repository https://gitbox.apache.org/repos/asf/ofbiz-framework.git
The following commit(s) were added to refs/heads/release18.12 by this push: new 27a9f3f Fixed: [SECURITY] CVE-2022-23437: Infinite loop within Apache XercesJ xml parser (OFBIZ-12549) 27a9f3f is described below commit 27a9f3fe72f1ff5c06c52da25ae02586d74b68a6 Author: Jacques Le Roux <jacques.le.r...@les7arts.com> AuthorDate: Mon Jan 31 18:09:28 2022 +0100 Fixed: [SECURITY] CVE-2022-23437: Infinite loop within Apache XercesJ xml parser (OFBIZ-12549) Severity: high Description: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions. Mitigation: Apache XercesJ users, should migrate to version 2.12.2 Credit: This issue was discovered by Sergey Temnikov and Ziyi Luo, from Amazon Corretto/JDK Team References: https://markmail.org/message/vcmhwbuorfgcdr6l jleroux: I already removed the "apache-" prefix but for a reason did not commit --- build.gradle | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/build.gradle b/build.gradle index b6280fd..2d149da 100644 --- a/build.gradle +++ b/build.gradle @@ -119,7 +119,7 @@ allprojects { url "https://maven.restlet.talend.com" } maven { - // apache-xerces:xercesImpl:2.12.2 + // xerces:xercesImpl:2.12.2 url "https://maven.repository.redhat.com/ga/" } maven { @@ -160,7 +160,7 @@ configurations { dependencies { // ofbiz compile libs - compile 'apache-xerces:xercesImpl:2.12.2' + compile 'xerces:xercesImpl:2.12.2' compile 'com.google.zxing:core:3.3.3' compile 'com.googlecode.concurrentlinkedhashmap:concurrentlinkedhashmap-lru:1.4.2' compile 'com.googlecode.ez-vcard:ez-vcard:0.9.10'