Bug#1023573: hsqldb: CVE-2022-41853

Salvatore Bonaccorso carnil at debian.org
Sun Nov 6 20:21:49 GMT 2022


Source: hsqldb
Version: 2.7.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for hsqldb.

CVE-2022-41853[0]:
| Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb
| (HyperSQL DataBase) to process untrusted input may be vulnerable to a
| remote code execution attack. By default it is allowed to call any
| static method of any Java class in the classpath resulting in code
| execution. The issue can be prevented by updating to 2.7.1 or by
| setting the system property "hsqldb.method_class_names" to classes
| which are allowed to be called. For example,
| System.setProperty("hsqldb.method_class_names", "abc") or Java
| argument -Dhsqldb.method_class_names="abc" can be used. From version
| 2.7.1 all classes by default are not accessible except those in
| java.lang.Math and need to be manually enabled.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-41853
    https://www.cve.org/CVERecord?id=CVE-2022-41853
[1] https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7
[2] http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control
[3] https://sourceforge.net/p/hsqldb/svn/6614/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



More information about the pkg-java-maintainers mailing list