Description:

Apache Commons BCEL has a number of APIs that would normally only allow 
changing specific class characteristics. However, due to an out-of-bounds 
writing issue, these APIs can be used to produce arbitrary bytecode. This could 
be abused in applications that pass attacker-controllable data to those APIs, 
giving the attacker more control over the resulting bytecode than otherwise 
expected. Update to Apache Commons BCEL 6.6.0.

This issue is being tracked as BCEL-363

Credit:

Reported by Felix Wilhelm (Google); GitHub pull request to Apache Commons BCEL 
#147 by Richard Atkins (https://github.com/rjatkins); PR derived from OpenJDK 
(https://github.com/openjdk/jdk11u/) commit 
13bf52c8d876528a43be7cb77a1f452d29a21492 by Aleksei Voitylov and RealCLanger 
(Christoph Langer https://github.com/RealCLanger)


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
For additional commands, e-mail: dev-h...@commons.apache.org

Reply via email to