Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <bedb9133-e1e5-df85-a534-a09fdee8e673@apache.org>
Date: Thu, 03 Oct 2024 10:14:59 +0000
From: Martin Tzvetanov Grigorov <mgrigorov@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-47561: Apache Avro Java SDK: Arbitrary Code Execution
 when reading Avro Data (Java SDK) 

Severity: critical

Affected versions:

- Apache Avro Java SDK before 1.11.4

Description:

Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code.
Users are recommended to upgrade to version 1.11.4  or 1.12.0, which fix this issue.

Credit:

Kostya Kortchinsky, from the Databricks Security Team (finder)

References:

https://avro.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-47561

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.