Bug 2316116 (CVE-2024-47561)

Summary: CVE-2024-47561 apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: anstephe, aprice, arajendr, asoldano, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, caswilli, ccranfor, cdewolf, chazlett, clement.escoffier, cmiranda, cmoore, dandread, darran.lofthouse, dfreiber, dkreling, dosoudil, drichtar, drow, eric.wittmann, fjuma, fmariani, fmongiar, ggrzybek, gmalinko, gmccullo, gsmet, istudens, ivassile, iweiss, jahealy, janstey, jburrell, jcantril, jkoops, jmartisk, jnethert, jpechane, jpoth, jsamir, kaycoth, kholdawa, lgao, lphiri, lthon, manderse, mosmerov, mpierce, msochure, msvehla, nipatil, npecka, nwallace, olubyans, pantinor, pcongius, pdelbell, pdrozd, peholase, pgallagh, pjindal, pmackay, probinso, pskopek, rkubis, rmartinc, rowaters, rruss, rstancel, rstepani, rsvoboda, sausingh, sbiarozk, sdouglas, security-response-team, smaestri, sthorger, tcunning, tom.jenkinson, tqvarnst, vkumar, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special "java-class" attribute.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Deadline: 2024-10-03   

Description OSIDB Bzimport 2024-10-02 14:16:46 UTC
A vulnerability was found in Apache Avro. The project would be affected if it accepts an Avro schema for parsing
provided by the end-user. By using the special "java-class" attribute an attacker can trigger remote code execution.
The issue is fixed in Avro 1.11.4 and 1.12.0.

Comment 2 errata-xmlrpc 2024-10-08 16:04:08 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:7812 https://access.redhat.com/errata/RHSA-2024:7812

Comment 3 errata-xmlrpc 2024-10-08 16:05:41 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2024:7811 https://access.redhat.com/errata/RHSA-2024:7811

Comment 4 errata-xmlrpc 2024-10-09 12:35:15 UTC
This issue has been addressed in the following products:

  Red Hat build of Apicurio Registry 2.6.5 GA

Via RHSA-2024:7861 https://access.redhat.com/errata/RHSA-2024:7861

Comment 5 errata-xmlrpc 2024-10-10 14:00:30 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel for Quarkus 2.13

Via RHSA-2024:7972 https://access.redhat.com/errata/RHSA-2024:7972

Comment 6 errata-xmlrpc 2024-10-14 15:53:54 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.4.3 for Spring Boot

Via RHSA-2024:8064 https://access.redhat.com/errata/RHSA-2024:8064

Comment 7 errata-xmlrpc 2024-10-14 19:55:06 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:8093 https://access.redhat.com/errata/RHSA-2024:8093

Comment 8 errata-xmlrpc 2024-10-22 18:29:42 UTC
This issue has been addressed in the following products:

  RHINT Camel-K 1.10.8

Via RHSA-2024:8339 https://access.redhat.com/errata/RHSA-2024:8339

Comment 10 errata-xmlrpc 2024-11-25 00:10:51 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7

Via RHSA-2024:10208 https://access.redhat.com/errata/RHSA-2024:10208

Comment 11 errata-xmlrpc 2024-11-25 00:11:33 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7

Via RHSA-2024:10207 https://access.redhat.com/errata/RHSA-2024:10207