First published: Tue Dec 13 2022(Updated: )
The Byte Code Engineering Library (Apache Commons BCEL) is intended to give users a convenient way to analyze, create, and manipulate (binary) Java class files (those ending with .class).<br>Security Fix(es):<br><li> Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bcel | <5.2-19.el7_9 | 5.2-19.el7_9 |
redhat/bcel | <5.2-19.el7_9 | 5.2-19.el7_9 |
redhat/bcel-javadoc | <5.2-19.el7_9 | 5.2-19.el7_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:8958 is classified as important.
To fix RHSA-2022:8958, update the Apache Commons BCEL package to version 5.2-19.el7_9.
RHSA-2022:8958 affects the Apache Commons BCEL package and its related javadoc package.
RHSA-2022:8958 addresses a vulnerability related to arbitrary bytecode execution due to out-of-bounds access.
There are no specific workarounds recommended for RHSA-2022:8958; updating is the best course of action.