I agree that this is confusing, and perhaps the error message itself
could at least clarify that it is a security issue, and that if the
input is trusted then it is simple to turn the option back on.

There is a bit more information in the /usr/share/doc/libsaxonb-
java/README.Debian file, clarifying that the default is different in the
Debian (and thus Ubuntu) packaging of saxonb than in the original
upstream distribution.  It says:

Calls on external Java functions disabled by default
----------------------------------------------------

By default, SaxonB enables calls on external Java functions to be
embedded in stylesheets or queries. Such calls can invoke arbitrary
Java methods and are thus a security risk when executing untrusted
XSLT stylesheets of XQuery queries.  For this reason, SaxonB in Debian
comes with calls on external Java functions disabled by default.

If you are using the command line interface to the XSLT 2.0 or XQuery
processors of Saxon, you can enable this feature by passing the
"-ext:on" flag to your command line invocation.

If you are using SaxonB from its Java API you should set the Attribute
"FeatureKeys.ALLOW_EXTERNAL_FUNCTIONS" to "true". See the API
reference in the libsaxonb-java-doc package for more information.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/412517

Title:
  extension functions disabled in Saxon B XSLT 2.0 processor

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/saxonb/+bug/412517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to