Date: Wed, 15 Nov 2017 08:34:51 +0000 (UTC) From: Andrea Cosentino <ancosen1985@...oo.com> To: Dev <dev@...el.apache.org>, Users <users@...el.apache.org>, Man Yue Mo <mmo@...mle.com>, "security@...che.org" <security@...che.org>, "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: [SECURITY] New security advisory CVE-2017-12634 released for Apache Camel A new security advisory has been released for Apache Camel, that is fixed in the recent 2.19.4 and 2.20.1 releases: CVE-2017-12634: Apache Camel's Castor unmarshalling operation is vulnerableto Remote Code Execution attacks The full text of the advisory is the following: CVE-2017-12634: Apache Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution attacks Severity: MEDIUM Vendor: The Apache Software Foundation Versions Affected: Camel 2.19.0 to 2.19.3 and Camel 2.20.0. The unsupported Camel 2.x (2.18 and earlier) versions may be also affected. Description: Apache Camel's camel-castor component is vulnerable to Java objectde-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. Mitigation: 2.19.x users should upgrade to 2.19.4, 2.20.0 users should upgrade to 2.20.1. The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-11929 refers to the various commits that resovoled the issue, and have more details. Credit: This issue was discovered by Man Yue Mo <mmo at semmle dot com> from Semmle/lgtm.com.On behalf of the Apache Camel PMC On behalf of the Apache Camel PMC -- Andrea Cosentino ---------------------------------- Apache Camel PMC Member Apache Karaf Committer Apache Servicemix PMC Member Email: ancosen1985@...oo.com Twitter: @oscerd2 Github: oscerd
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.