First published: Mon Jan 02 2023(Updated: )
The Byte Code Engineering Library (Apache Commons BCEL) is intended to give users a convenient way to analyze, create, and manipulate (binary) Java class files (those ending with .class).<br>Security Fix(es):<br><li> Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bcel | <6.4.1-9.el9_1 | 6.4.1-9.el9_1 |
redhat/bcel | <6.4.1-9.el9_1 | 6.4.1-9.el9_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0005 is classified as important.
To fix RHSA-2023:0005, update the bcel package to version 6.4.1-9.el9_1 or later.
RHSA-2023:0005 addresses a vulnerability in the Byte Code Engineering Library (Apache Commons BCEL) related to arbitrary bytecode execution.
RHSA-2023:0005 affects the bcel package version prior to 6.4.1-9.el9_1.
RHSA-2023:0005 helps mitigate the risk of executing malicious or arbitrary bytecode through out-of-bounds inputs.