Source: hsqldb Version: 2.7.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for hsqldb. CVE-2022-41853[0]: | Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb | (HyperSQL DataBase) to process untrusted input may be vulnerable to a | remote code execution attack. By default it is allowed to call any | static method of any Java class in the classpath resulting in code | execution. The issue can be prevented by updating to 2.7.1 or by | setting the system property "hsqldb.method_class_names" to classes | which are allowed to be called. For example, | System.setProperty("hsqldb.method_class_names", "abc") or Java | argument -Dhsqldb.method_class_names="abc" can be used. From version | 2.7.1 all classes by default are not accessible except those in | java.lang.Math and need to be manually enabled. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-41853 https://www.cve.org/CVERecord?id=CVE-2022-41853 [1] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7 [2] http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control [3] https://sourceforge.net/p/hsqldb/svn/6614/ Please adjust the affected versions in the BTS as needed. Regards, Salvatore