I have requested more details about CVE-2024-47561 directly from the Apache 
Avro project in this email to the us...@avro.apache.org mailing list: 
https://lists.apache.org/thread/hrlxrn229vj7fkryx12npz8ws64026qo

Questions asked:

1. Is the RCE issue (Arbitrary Code Execution when reading Avro Data) reported 
in CVE-2024-47561 known to be exploitable in the default configuration of 
Apache Avro Java SDK?

2. Given that upgrading and patching all systems with Avro 1.11.4/1.12.0 will 
take some time, are there known workarounds or mitigations?

-Lari

On 2024/10/03 20:58:43 Lari Hotari wrote:
> Dear Pulsar Community,
> 
> There's a critical 9.3/10 level RCE vulnerability in Avro Java SDK
> <1.11.4, CVE-2024-47561.
> More details can be found in these resources:
> - https://github.com/advisories/GHSA-r7pg-v2c8-mfg3
> - https://nvd.nist.gov/vuln/detail/CVE-2024-47561
> - https://lists.apache.org/thread/c2v7mhqnmq0jmbwxqq3r5jbj1xg43h5x
> 
> In Pulsar, there's a PR under review to upgrade Avro to 1.11.4:
> https://github.com/apache/pulsar/pull/23394
> 
> I suggest that we start preparations for expedited Pulsar 3.0.7 and
> 3.3.2 releases due to this critical vulnerability. I can volunteer to
> handle these releases as a release manager.
> 
> Further coordination of these releases and discussions about possible
> mitigations will be on the dev@pulsar.apache.org mailing list. I have
> also sent this message to the us...@pulsar.apache.org list. Mailing
> list archives and joining instructions for the dev mailing list can be
> found at https://pulsar.apache.org/contact/.
> 
> -Lari
> 

Reply via email to