A vulnerability was found in Apache Avro. The project would be affected if it accepts an Avro schema for parsing provided by the end-user. By using the special "java-class" attribute an attacker can trigger remote code execution. The issue is fixed in Avro 1.11.4 and 1.12.0.
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2024:7812 https://access.redhat.com/errata/RHSA-2024:7812
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 Via RHSA-2024:7811 https://access.redhat.com/errata/RHSA-2024:7811
This issue has been addressed in the following products: Red Hat build of Apicurio Registry 2.6.5 GA Via RHSA-2024:7861 https://access.redhat.com/errata/RHSA-2024:7861
This issue has been addressed in the following products: Red Hat build of Apache Camel for Quarkus 2.13 Via RHSA-2024:7972 https://access.redhat.com/errata/RHSA-2024:7972
This issue has been addressed in the following products: Red Hat build of Apache Camel 4.4.3 for Spring Boot Via RHSA-2024:8064 https://access.redhat.com/errata/RHSA-2024:8064
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2024:8093 https://access.redhat.com/errata/RHSA-2024:8093
This issue has been addressed in the following products: RHINT Camel-K 1.10.8 Via RHSA-2024:8339 https://access.redhat.com/errata/RHSA-2024:8339
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Via RHSA-2024:10208 https://access.redhat.com/errata/RHSA-2024:10208
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Via RHSA-2024:10207 https://access.redhat.com/errata/RHSA-2024:10207