Bug 2439675 (CVE-2025-33042)

Summary: CVE-2025-33042 org.apache.avro/avro: Apache Avro Java SDK: Code injection on Java generated code
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: anstephe, aschwart, asoldano, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, ccranfor, chfoley, clement.escoffier, dandread, darran.lofthouse, dfreiber, dkreling, dosoudil, drow, eric.wittmann, fmariani, fmongiar, gmalinko, gsmet, istudens, ivassile, iweiss, janstey, jburrell, jmartisk, jnethert, jpechane, jscholz, lthon, manderse, mosmerov, mposolda, msvehla, nipatil, nwallace, olubyans, pantinor, pberan, pdelbell, pesilva, pgallagh, pjindal, pmackay, probinso, rguimara, rkubis, rmartinc, rruss, rstancel, rstepani, rsvoboda, sbiarozk, smaestri, ssilvert, sthorger, swoodman, tcunning, tom.jenkinson, tqvarnst, vkumar, vmuzikar, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A code injection flaw has been discovered in Apache Avro. This vulnerability manifests when generating specific records from untrusted Avro schemas.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2439735, 2439736, 2439737, 2439738    
Bug Blocks:    

Description OSIDB Bzimport 2026-02-13 12:01:07 UTC
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas.

This issue affects Apache Avro Java SDK: all versions through 1.11.4 and versionĀ 1.12.0.

Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.