This is an automated email from the ASF dual-hosted git repository.

btellier pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/james-project.git


The following commit(s) were added to refs/heads/master by this push:
     new 0f33615907 [ANNOUNCE] CVE-2024-37358 + CVE-2024-45626 (#2627)
0f33615907 is described below

commit 0f33615907e4866c350acd8f554389b13450fd5f
Author: Benoit TELLIER <btell...@linagora.com>
AuthorDate: Wed Feb 5 17:59:51 2025 +0100

    [ANNOUNCE] CVE-2024-37358 + CVE-2024-45626 (#2627)
---
 CHANGELOG.md                                        | 18 +++++++++++++++---
 docs/modules/servers/partials/operate/security.adoc | 19 +++++++++++++++++++
 src/homepage/_posts/2025-01-29-james-3.7.6.markdown |  9 +++++++++
 src/homepage/_posts/2025-01-29-james-3.8.2.markdown |  9 +++++++++
 src/site/xdoc/server/feature-security.xml           | 18 ++++++++++++++++++
 5 files changed, 70 insertions(+), 3 deletions(-)

diff --git a/CHANGELOG.md b/CHANGELOG.md
index 71e6c77e13..916234aba8 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -285,10 +285,16 @@ No changes yet.
 
 ## [3.8.2] - 2025-02-05
 
-### Bug fixes
+### Security
+
+- **CVE-2024-37358**: Denial of service through the use of IMAP literals
+- **CVE-2024-45626**: Denial of service through JMAP HTML to text conversion
 
 - [FIX] Prevent HtmlTextExtractor to generate asymmetric outputs
 - [IMPROVEMENT] Better manage IMAP literals (3.8.x) (#2281)
+
+### Bug fixes
+
 - JAMES-4036 JMS mailQueue should silent interuptedExceptions upon shutdown
 - JAMES-4041 Fix OOM upon IMAP COPY
 - JAMES-4037 Resolve MailboxTyper for Spring (#2255)
@@ -617,11 +623,17 @@ No changes yet.
 
 ## [3.7.6] - 2025-02-05
 
+### Security
+
+- **CVE-2024-37358**: Denial of service through the use of IMAP literals
+- **CVE-2024-45626**: Denial of service through JMAP HTML to text conversion
+
+- [FIX] Prevent HtmlTextExtractor to generate asymmetric outputs
+- [IMPROVEMENT] Better manage IMAP literals (3.8.x) (#2281)
+
 ### Bug fixes
 
  - [BUILD] Fully drop glowroot
- - [FIX] Prevent HtmlTextExtractor to generate asymmetric outputs
- - [IMPROVEMENT] Better manage IMAP literals (3.7.x) (#2282)
  - [FIX] Solve weave/rest-smtp-sink: Docker image manifest v2 schema 1 
deprecation issue (#2152)
  - JAMES-3955 Increase consumer timeout for TaskManagerWorkQueue
  - JAMES-3955 WARNING logs upon closing channels
diff --git a/docs/modules/servers/partials/operate/security.adoc 
b/docs/modules/servers/partials/operate/security.adoc
index 7f84aeb5de..16758d5aee 100644
--- a/docs/modules/servers/partials/operate/security.adoc
+++ b/docs/modules/servers/partials/operate/security.adoc
@@ -109,6 +109,25 @@ outdated dependencies.
 
 We follow the standard procedures within the ASF regarding 
link:https://apache.org/security/committers.html#vulnerability-handling[vulnerability
 handling]
 
+=== CVE-2024-37358: Denial of service through the use of IMAP literals
+
+Apache James prior to versions  3.8.2 or 3.7.6 allows an attacker
+to trigger a denial of service by exploiting IMAP literals.
+
+*Severity*: Moderate
+
+*Mitigation*: Update to Apache James 3.8.2 or 3.7.6 onward.
+
+=== CVE-2024-45626: Denial of service through JMAP HTML to text conversion
+
+Apache James prior to versions  3.8.2 or 3.7.6 allows logged in attacker
+to trigger a denial of service by exploiting html to text conversion.
+
+*Severity*: Moderate
+
+*Mitigation*: Update to Apache James 3.8.2 or 3.7.6 onward.
+
+
 === CVE-2024-21742: Mime4J DOM header injection
 
 Apache JAMES MIME4J prior to version 0.8.10 allow attackers able to specify 
the value of a header field to craft other header fields.
diff --git a/src/homepage/_posts/2025-01-29-james-3.7.6.markdown 
b/src/homepage/_posts/2025-01-29-james-3.7.6.markdown
index f37a0d912f..95cb78fbc1 100644
--- a/src/homepage/_posts/2025-01-29-james-3.7.6.markdown
+++ b/src/homepage/_posts/2025-01-29-james-3.7.6.markdown
@@ -11,6 +11,15 @@ Early adopters can [download it][download], any issue can be 
reported on our iss
 
 The Apache James PMC would like to thanks all contributors who made this 
release possible!
 
+## Announcement
+
+This release comprise minor bug fixes enhancing Apache James stability.
+
+This release fixes the following security issues:
+
+- **CVE-2024-37358**: Denial of service through the use of IMAP literals
+- **CVE-2024-45626**: Denial of service through JMAP HTML to text conversion
+
 ## Release changelog
 
 The full changes included in this release can be seen in the 
[CHANGELOG][CHANGELOG].
diff --git a/src/homepage/_posts/2025-01-29-james-3.8.2.markdown 
b/src/homepage/_posts/2025-01-29-james-3.8.2.markdown
index ca1cd65eba..67b237779e 100644
--- a/src/homepage/_posts/2025-01-29-james-3.8.2.markdown
+++ b/src/homepage/_posts/2025-01-29-james-3.8.2.markdown
@@ -11,6 +11,15 @@ Early adopters can [download it][download], any issue can be 
reported on our iss
 
 The Apache James PMC would like to thank all contributors who made this 
release possible!
 
+## Announcement
+
+This release comprise minor bug fixes enhancing Apache James stability.
+
+This release fixes the following security issues:
+
+- **CVE-2024-37358**: Denial of service through the use of IMAP literals
+- **CVE-2024-45626**: Denial of service through JMAP HTML to text conversion
+
 ## Release changelog
 
 The full changes included in this release can be seen in the 
[CHANGELOG][CHANGELOG].
diff --git a/src/site/xdoc/server/feature-security.xml 
b/src/site/xdoc/server/feature-security.xml
index e69ec93365..cebf614e5c 100644
--- a/src/site/xdoc/server/feature-security.xml
+++ b/src/site/xdoc/server/feature-security.xml
@@ -61,6 +61,24 @@
             <a 
href="https://apache.org/security/committers.html#vulnerability-handling";>vulnerability
 handling</a>.
         </subsection>
 
+        <subsection name="CVE-2024-37358: Denial of service through the use of 
IMAP literals">
+            <p> Apache James prior to versions  3.8.2 or 3.7.6 allows an 
attacker
+                to trigger a denial of service by exploiting IMAP literals.</p>
+
+            <p><b>Severity</b>: Moderate</p>
+
+            <p><b>Mitigation</b>: Update to Apache James 3.8.2 or 3.7.6 
onward.</p>
+        </subsection>
+
+        <subsection name="CVE-2024-45626: Denial of service through JMAP HTML 
to text conversion">
+            <p> Apache James prior to versions  3.8.2 or 3.7.6 allows logged 
in attacker
+                to trigger a denial of service by exploiting html to text 
conversion.</p>
+
+            <p><b>Severity</b>: Moderate</p>
+
+            <p><b>Mitigation</b>: Update to Apache James 3.8.2 or 3.7.6 
onward.</p>
+        </subsection>
+
         <subsection name="CVE-2024-21742: Mime4J DOM header injection">
             <p> Apache JAMES MIME4J prior to version 0.8.10 allow attackers 
able to specify the value of a header field to craft other header fields.</p>
 


---------------------------------------------------------------------
To unsubscribe, e-mail: notifications-unsubscr...@james.apache.org
For additional commands, e-mail: notifications-h...@james.apache.org

Reply via email to