|
Message-ID: <bedb9133-e1e5-df85-a534-a09fdee8e673@apache.org> Date: Thu, 03 Oct 2024 10:14:59 +0000 From: Martin Tzvetanov Grigorov <mgrigorov@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-47561: Apache Avro Java SDK: Arbitrary Code Execution when reading Avro Data (Java SDK) Severity: critical Affected versions: - Apache Avro Java SDK before 1.11.4 Description: Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code. Users are recommended to upgrade to version 1.11.4 or 1.12.0, which fix this issue. Credit: Kostya Kortchinsky, from the Databricks Security Team (finder) References: https://avro.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-47561
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.