Bug 2142707 (CVE-2022-42920) - CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
Summary: CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bo...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-42920
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2142726 2142727 2142728 2143230 2143231 2143232 2143233 2143510 2143511 2143512 2143514
Blocks: 2140189
TreeView+ depends on / blocked
 
Reported: 2022-11-15 01:42 UTC by Chess Hazlett
Modified: 2024-02-06 04:15 UTC (History)
50 users (show)

Fixed In Version: Apache Commons BCEL 6.6.0
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds (OOB) write flaw was found in Apache Commons BCEL API. This flaw can be used to produce arbitrary bytecode and may abuse applications that pass attacker-controlled data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected.
Clone Of:
Environment:
Last Closed: 2023-01-28 23:52:15 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:8958 0 None None None 2022-12-13 14:05:02 UTC
Red Hat Product Errata RHSA-2022:8959 0 None None None 2022-12-13 13:59:24 UTC
Red Hat Product Errata RHSA-2023:0004 0 None None None 2023-01-02 06:21:47 UTC
Red Hat Product Errata RHSA-2023:0005 0 None None None 2023-01-02 06:21:41 UTC
Red Hat Product Errata RHSA-2023:0470 0 None None None 2023-01-26 12:21:25 UTC
Red Hat Product Errata RHSA-2023:0471 0 None None None 2023-01-26 12:15:21 UTC
Red Hat Product Errata RHSA-2023:0934 0 None None None 2023-02-28 00:50:35 UTC
Red Hat Product Errata RHSA-2023:3954 0 None None None 2023-06-29 20:07:42 UTC
Red Hat Product Errata RHSA-2023:4983 0 None None None 2023-09-05 18:37:13 UTC

Description Chess Hazlett 2022-11-15 01:42:49 UTC
Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.

Comment 2 TEJ RATHI 2022-11-15 05:04:41 UTC
Created bcel tracking bugs for this issue:

Affects: fedora-35 [bug 2142727]
Affects: fedora-36 [bug 2142728]


Created findbugs-bcel tracking bugs for this issue:

Affects: epel-7 [bug 2142726]

Comment 7 TEJ RATHI 2022-11-17 04:20:42 UTC
Created bcel tracking bugs for this issue:

Affects: fedora-37 [bug 2143514]

Comment 13 errata-xmlrpc 2022-12-13 13:59:21 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2022:8959 https://access.redhat.com/errata/RHSA-2022:8959

Comment 14 errata-xmlrpc 2022-12-13 14:04:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:8958 https://access.redhat.com/errata/RHSA-2022:8958

Comment 18 errata-xmlrpc 2023-01-02 06:21:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0005 https://access.redhat.com/errata/RHSA-2023:0005

Comment 19 errata-xmlrpc 2023-01-02 06:21:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0004 https://access.redhat.com/errata/RHSA-2023:0004

Comment 20 errata-xmlrpc 2023-01-26 12:15:18 UTC
This issue has been addressed in the following products:

  Migration Toolkit for Runtimes 1 on RHEL 8

Via RHSA-2023:0471 https://access.redhat.com/errata/RHSA-2023:0471

Comment 21 errata-xmlrpc 2023-01-26 12:21:22 UTC
This issue has been addressed in the following products:

  Migration Toolkit for Runtimes 1 on RHEL 8

Via RHSA-2023:0470 https://access.redhat.com/errata/RHSA-2023:0470

Comment 22 Product Security DevOps Team 2023-01-28 23:52:10 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-42920

Comment 23 errata-xmlrpc 2023-02-28 00:50:32 UTC
This issue has been addressed in the following products:

  MTA-6.0-RHEL-8

Via RHSA-2023:0934 https://access.redhat.com/errata/RHSA-2023:0934

Comment 25 errata-xmlrpc 2023-06-29 20:07:38 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.12

Via RHSA-2023:3954 https://access.redhat.com/errata/RHSA-2023:3954

Comment 26 errata-xmlrpc 2023-09-05 18:37:10 UTC
This issue has been addressed in the following products:

  RHPAM 7.13.4 async

Via RHSA-2023:4983 https://access.redhat.com/errata/RHSA-2023:4983


Note You need to log in before you can comment on or make changes to this bug.