About Security
For information about reporting or asking questions about security, please see
Apache Commons Security
.
This page lists all security vulnerabilities fixed in released versions of this component.
Please note that binary patches are never provided. If you need to apply a source code patch, use the building instructions for the component version
that you are using.
If you need help on building this component or other help on following the instructions to mitigate the known vulnerabilities listed here, please send
your questions to the public
user mailing list
.
If you have encountered an unlisted security vulnerability or other unexpected behavior that has security impact, or if the descriptions here are
incomplete, please report them privately to the Apache Security Team. Thank you.
Security Vulnerabilities
CVE-2022-42920
- CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing.
- Severity: Critical
- CWE-ID: CWE-787
- Vendor: The Apache Software Foundation
- Versions Affected: Apache Commons BCEL before 6.6.0.
- Description: Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an
out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass
attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache
Commons BCEL 6.6.0.
- Mitigation: Users are recommended to upgrade to version 6.6.0 or later, which fixes the issue.
- Credit: Reported by Felix Wilhelm (Google)
- Credit: GitHub pull request to Apache Commons BCEL #147 by Richard Atkins (https://github.com/rjatkins)
- Credit: PR
derived from OpenJDK (https://github.com/openjdk/jdk11u/) commit 13bf52c8d876528a43be7cb77a1f452d29a21492 by Aleksei Voitylov and
RealCLanger (Christoph Langer https://github.com/RealCLanger)
|