First published: Tue Dec 13 2022(Updated: )
The Byte Code Engineering Library (Apache Commons BCEL) is intended to give users a convenient way to analyze, create, and manipulate (binary) Java class files (those ending with .class).<br>Security Fix(es):<br><li> Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven36-bcel | <6.3.1-2.3.el7 | 6.3.1-2.3.el7 |
redhat/rh-maven36-bcel | <6.3.1-2.3.el7 | 6.3.1-2.3.el7 |
redhat/rh-maven36-bcel-javadoc | <6.3.1-2.3.el7 | 6.3.1-2.3.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:8959 is classified as a significant concern due to the potential for arbitrary bytecode execution.
To fix RHSA-2022:8959, upgrade the affected package to version 6.3.1-2.3.el7 or later.
RHSA-2022:8959 affects the Apache Commons BCEL library, specifically the rh-maven36-bcel and rh-maven36-bcel-javadoc packages.
RHSA-2022:8959 addresses vulnerabilities related to out-of-bounds access that can result in arbitrary bytecode execution.
Yes, if you are using affected versions of the software, it is critical to apply the patches to mitigate the risk of exploitation.