Bug 2316116 (CVE-2024-47561) - CVE-2024-47561 apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
Summary: CVE-2024-47561 apache-avro: Schema parsing may trigger Remote Code Execution ...
Keywords:
Status: NEW
Alias: CVE-2024-47561
Deadline: 2024-10-03
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-02 14:16 UTC by OSIDB Bzimport
Modified: 2025-03-17 23:44 UTC (History)
88 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:10207 0 None None None 2024-11-25 00:11:37 UTC
Red Hat Product Errata RHSA-2024:10208 0 None None None 2024-11-25 00:10:56 UTC
Red Hat Product Errata RHSA-2024:7811 0 None None None 2024-10-08 16:05:46 UTC
Red Hat Product Errata RHSA-2024:7812 0 None None None 2024-10-08 16:04:13 UTC
Red Hat Product Errata RHSA-2024:7861 0 None None None 2024-10-09 12:35:20 UTC
Red Hat Product Errata RHSA-2024:7972 0 None None None 2024-10-10 14:00:35 UTC
Red Hat Product Errata RHSA-2024:8064 0 None None None 2024-10-14 15:53:59 UTC
Red Hat Product Errata RHSA-2024:8093 0 None None None 2024-10-14 19:55:10 UTC
Red Hat Product Errata RHSA-2024:8339 0 None None None 2024-10-22 18:29:47 UTC

Description OSIDB Bzimport 2024-10-02 14:16:46 UTC
A vulnerability was found in Apache Avro. The project would be affected if it accepts an Avro schema for parsing
provided by the end-user. By using the special "java-class" attribute an attacker can trigger remote code execution.
The issue is fixed in Avro 1.11.4 and 1.12.0.

Comment 2 errata-xmlrpc 2024-10-08 16:04:08 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:7812 https://access.redhat.com/errata/RHSA-2024:7812

Comment 3 errata-xmlrpc 2024-10-08 16:05:41 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2024:7811 https://access.redhat.com/errata/RHSA-2024:7811

Comment 4 errata-xmlrpc 2024-10-09 12:35:15 UTC
This issue has been addressed in the following products:

  Red Hat build of Apicurio Registry 2.6.5 GA

Via RHSA-2024:7861 https://access.redhat.com/errata/RHSA-2024:7861

Comment 5 errata-xmlrpc 2024-10-10 14:00:30 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel for Quarkus 2.13

Via RHSA-2024:7972 https://access.redhat.com/errata/RHSA-2024:7972

Comment 6 errata-xmlrpc 2024-10-14 15:53:54 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.4.3 for Spring Boot

Via RHSA-2024:8064 https://access.redhat.com/errata/RHSA-2024:8064

Comment 7 errata-xmlrpc 2024-10-14 19:55:06 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:8093 https://access.redhat.com/errata/RHSA-2024:8093

Comment 8 errata-xmlrpc 2024-10-22 18:29:42 UTC
This issue has been addressed in the following products:

  RHINT Camel-K 1.10.8

Via RHSA-2024:8339 https://access.redhat.com/errata/RHSA-2024:8339

Comment 10 errata-xmlrpc 2024-11-25 00:10:51 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7

Via RHSA-2024:10208 https://access.redhat.com/errata/RHSA-2024:10208

Comment 11 errata-xmlrpc 2024-11-25 00:11:33 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7

Via RHSA-2024:10207 https://access.redhat.com/errata/RHSA-2024:10207


Note You need to log in before you can comment on or make changes to this bug.