First published: Fri Nov 04 2022(Updated: )
An out-of-bounds (OOB) write flaw was found in Apache Commons BCEL API. This flaw can be used to produce arbitrary bytecode and may abuse applications that pass attacker-controlled data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bcel | <0:5.2-19.el7_9 | 0:5.2-19.el7_9 |
redhat/bcel | <0:6.4.1-9.el9_1 | 0:6.4.1-9.el9_1 |
redhat/bcel | <0:6.4.1-9.el9_0 | 0:6.4.1-9.el9_0 |
redhat/rh-maven36-bcel | <0:6.3.1-2.3.el7 | 0:6.3.1-2.3.el7 |
Apache Commons BCEL | <6.6.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
redhat/Apache Commons BCEL | <6.6.0 | 6.6.0 |
maven/org.apache.bcel:bcel | <6.6.0 | 6.6.0 |
<6.6.0 | ||
=35 | ||
=36 | ||
=37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-42920 is an out-of-bounds (OOB) write flaw found in Apache Commons BCEL API.
CVE-2022-42920 can be exploited by passing attacker-controllable data to the affected APIs in Apache Commons BCEL.
CVE-2022-42920 has a severity rating of 9.8 out of 10, which is classified as critical.
Apache Commons BCEL versions up to exclusive 6.6.0, bcel versions up to exclusive 0:5.2-19.el7_9, bcel versions up to exclusive 0:6.4.1-9.el9_1, bcel versions up to exclusive 0:6.4.1-9.el9_0, and rh-maven36-bcel versions up to exclusive 0:6.3.1-2.3.el7 are affected by CVE-2022-42920.
To mitigate CVE-2022-42920, it is recommended to update to Apache Commons BCEL version 6.6.0.