Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1752678237.112165.1589465926257@mail.yahoo.com>
Date: Thu, 14 May 2020 14:18:46 +0000 (UTC)
From: Andrea Cosentino <ancosen1985@...oo.com>
To: "dev@...el.apache.org" <dev@...el.apache.org>, 
	"users@...el.apache.org" <users@...el.apache.org>, 
	Apache Security Team <security@...che.org>, 
	"oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>, 
	"Colm O. HEigeartaigh" <coheigea@...che.org>, 
	Jonathan Gallimore <jonathan.gallimore@...il.com>
Subject: [SECURITY] New security advisory CVE-2020-11971 released for Apache
 Camel

A new security advisory has been released for Apache Camel, that is fixed in
the recent 2.25.1 and 3.2.0 releases.

CVE-2020-11971: Apache Camel JMX Rebind Flaw Vulnerability

Severity: MEDIUM

Vendor: The Apache Software Foundation

Versions Affected: Camel 2.25.0, Camel 3.0.0 to 3.1.0. The unsupported Camel 2.x (2.24 and earlier) versions may be also affected.

Description: Apache Camel JMX Rebind Flaw Vulnerability

Mitigation: 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0 The JIRA tickets: https://issues.apache.org/jira/browse/CAMEL-14811 refers to the various commits that resovoled the issue, and have more details.

Credit: This issue was discovered by Colm O. HEigeartaigh <coheigea at apache dot org> from Apache Software Foundation and Jonathan Gallimore <jonathan dot gallimore at gmail dot com> from Tomitribe

On behalf of the Apache Camel PMC

--
Andrea Cosentino 
----------------------------------
Apache Camel PMC Chair
Apache Karaf Committer
Apache Servicemix PMC Member
Email: ancosen1985@...oo.com
Twitter: @oscerd2
Github: oscerd

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.