Headline
GHSA-cr6p-23cf-w9g9: No security checking for UnsafeAccess.getInstance() in UnsafeAccessor
Overview
Affected versions have no limit to using unsafe-accessor. Can be ignored if SecurityCheck.AccessLimiter
not setup
Details
If UA was loaded as a named module, the internal data of UA will be protected by JVM and others can only access UA via UA’s standard api.
Main application can setup SecurityCheck.AccessLimiter
for UA to limit accesses to UA.
Untrusted code can access UA without lmitation in affected versions even UA was loaded as a named module.
References
No security checking for UnsafeAccess.getInstance() in UnsafeAccessor
Moderate severity GitHub Reviewed Published Jul 12, 2022 in Karlatemp/UnsafeAccessor • Updated Jul 12, 2022
Related news
UnsafeAccessor (UA) is a bridge to access jdk.internal.misc.Unsafe & sun.misc.Unsafe. Normally, if UA is loaded as a named module, the internal data of UA is protected by JVM and others can only access UA via UA's standard API. The main application can set up `SecurityCheck.AccessLimiter` for UA to limit access to UA. Starting with version 1.4.0 and prior to version 1.7.0, when `SecurityCheck.AccessLimiter` is set up, untrusted code can access UA without limitation, even when UA is loaded as a named module. This issue does not affect those for whom `SecurityCheck.AccessLimiter` is not set up. Version 1.7.0 contains a patch.