CVE-2022-31139

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-31139
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-31139.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-31139
Aliases
Published
2022-07-11T19:15:07Z
Modified
2024-10-12T09:39:35.757129Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

UnsafeAccessor (UA) is a bridge to access jdk.internal.misc.Unsafe & sun.misc.Unsafe. Normally, if UA is loaded as a named module, the internal data of UA is protected by JVM and others can only access UA via UA's standard API. The main application can set up SecurityCheck.AccessLimiter for UA to limit access to UA. Starting with version 1.4.0 and prior to version 1.7.0, when SecurityCheck.AccessLimiter is set up, untrusted code can access UA without limitation, even when UA is loaded as a named module. This issue does not affect those for whom SecurityCheck.AccessLimiter is not set up. Version 1.7.0 contains a patch.

References

Affected packages

Git / github.com/karlatemp/unsafeaccessor

Affected ranges

Type
GIT
Repo
https://github.com/karlatemp/unsafeaccessor
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.2.2
1.4.0
1.6.0
1.6.1
1.6.2