camel-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
Subject [camel] 12/14: Security Advisories: Porting to docs
Date Wed, 12 Sep 2018 11:47:44 GMT
This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch master
in repository

commit 7215c1e9ebc4f0b5411983c0ba14d3a48730c487
Author: Andrea Cosentino <>
AuthorDate: Wed Sep 12 13:45:40 2018 +0200

    Security Advisories: Porting to docs
 .../en/security-advisories/CVE-2017-12634.txt.asc  | 33 ++++++++++++++++++++++
 1 file changed, 33 insertions(+)

diff --git a/docs/user-manual/en/security-advisories/CVE-2017-12634.txt.asc b/docs/user-manual/en/security-advisories/CVE-2017-12634.txt.asc
new file mode 100644
index 0000000..de9771f
--- /dev/null
+++ b/docs/user-manual/en/security-advisories/CVE-2017-12634.txt.asc
@@ -0,0 +1,33 @@
+Hash: SHA1
+CVE-2017-12634: Apache Camel's Castor unmarshalling operation is vulnerable
+to Remote Code Execution attacks
+Severity: MEDIUM
+Vendor: The Apache Software Foundation
+Versions Affected: Camel 2.19.0 to 2.19.3 and Camel 2.20.0
+The unsupported Camel 2.x (2.18 and earlier) versions may be also affected.
+Description: Apache Camel's camel-castor component is vulnerable to Java object
+de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
+Mitigation: 2.19.x users should upgrade to 2.19.4, 2.20.0 users should upgrade to 2.20.1.

+The JIRA ticket:
+refers to the various commits that resovoled the issue, and have more details.
+Credit: This issue was discovered by Man Yue Mo <mmo at semmle dot com> from Semmle/
+Version: GnuPG v2.0.22 (GNU/Linux)

View raw message