
CVE-2022-41137 – Apache Hive: Deserialization of untrusted data when fetching partitions from the Metastore
https://notcve.org/view.php?id=CVE-2022-41137
05 Dec 2024 — Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it perfo... • https://github.com/apache/hive • CWE-502: Deserialization of Untrusted Data •

CVE-2024-45106 – Apache Ozone: Improper authentication when generating S3 secrets
https://notcve.org/view.php?id=CVE-2024-45106
03 Dec 2024 — Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if: * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false. * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators. Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the... • https://lists.apache.org/thread/rylnxwttp004kvotpk9j158vb238pfkm • CWE-287: Improper Authentication CWE-863: Incorrect Authorization •

CVE-2024-52338 – Apache Arrow R package: Arbitrary code execution when loading a malicious data file
https://notcve.org/view.php?id=CVE-2024-52338
28 Nov 2024 — Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that embeds a Python... • https://github.com/apache/arrow/commit/801de2fbcf5bcbce0c019ed4b35ff3fc863b141b • CWE-502: Deserialization of Untrusted Data •

CVE-2024-51569 – Apache NimBLE: Lack of input sanitization leading to out-of-bound reads in Number of Completed Packets HCI event handler
https://notcve.org/view.php?id=CVE-2024-51569
26 Nov 2024 — Out-of-bounds Read vulnerability in Apache NimBLE. Missing proper validation of HCI Number Of Completed Packets could lead to out-of-bound access when parsing HCI event and invalid read from HCI transport memory. This issue requires broken or bogus Bluetooth controller and thus severity is considered low. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. Out-of-bounds Read vulnerability in Apache NimBLE. Missing proper validation of HC... • https://lists.apache.org/thread/q0vs5rddx1lho30xnpsrvpzgxqmywnhs • CWE-125: Out-of-bounds Read •

CVE-2024-47250 – Apache NimBLE: Lack of input validation in HCI advertising report could lead to potential out-of-bound access
https://notcve.org/view.php?id=CVE-2024-47250
26 Nov 2024 — Out-of-bounds Read vulnerability in Apache NimBLE. Missing proper validation of HCI advertising report could lead to out-of-bound access when parsing HCI event and thus bogus GAP 'device found' events being sent. This issue requires broken or bogus Bluetooth controller and thus severity is considered low. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. Out-of-bounds Read vulnerability in Apache NimBLE. Missing proper validation of HC... • https://lists.apache.org/thread/zdb50spojlqbn0yxd866mbzqjt2vpt85 • CWE-125: Out-of-bounds Read •

CVE-2024-47249 – Apache NimBLE: Lack of input sanitization leading to out-of-bound reads in multiple advertisement handler
https://notcve.org/view.php?id=CVE-2024-47249
26 Nov 2024 — Improper Validation of Array Index vulnerability in Apache NimBLE. Lack of input validation for HCI events from controller could result in out-of-bound memory corruption and crash. This issue requires broken or bogus Bluetooth controller and thus severity is considered low. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. Improper Validation of Array Index vulnerability in Apache NimBLE. Lack of input validation for HCI events from co... • https://lists.apache.org/thread/7ckxw6481dp68ons627pjcb27c75n0mq • CWE-129: Improper Validation of Array Index •

CVE-2024-47248 – Apache NimBLE: Buffer overflow in NimBLE MESH Bluetooth stack
https://notcve.org/view.php?id=CVE-2024-47248
26 Nov 2024 — Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when non-default build configuration is used. This issue affects Apache NimBLE: through 1.7.0. Users are recommended to upgrade to version 1.8.0, which fixes the issue. Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Apache NimBLE. Specially crafted MESH message could result in memory corruption when no... • https://lists.apache.org/thread/z8m7jqh54xybf9kz8q2l3tz92zsj7tmz • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-45719 – Apache Answer: Predictable Authorization Token Using UUIDv1
https://notcve.org/view.php?id=CVE-2024-45719
22 Nov 2024 — Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.4.0. The ids generated using the UUID v1 version are to some extent not secure enough. It can cause the generated token to be predictable. Users are recommended to upgrade to version 1.4.1, which fixes the issue. Inadequate Encryption Strength vulnerability in Apache Answer. • https://lists.apache.org/thread/sz2d0z39k01nbx3r9pj65t76o1hy9491 • CWE-326: Inadequate Encryption Strength •

CVE-2024-52067 – Apache NiFi: Potential Insertion of Sensitive Parameter Values in Debug Log
https://notcve.org/view.php?id=CVE-2024-52067
21 Nov 2024 — Apache NiFi 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4 include optional debug logging of Parameter Context values during the flow synchronization process. An authorized administrator with access to change logging levels could enable debug logging for framework flow synchronization, causing the application to write Parameter names and values to the application log. Parameter Context values may contain sensitive information depending on application flow configuration. Deployments of Apache NiFi with ... • https://lists.apache.org/thread/9rz5rwn2zc7pfjq7ppqldqlc067tlcwd • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2024-31141 – Apache Kafka Clients: Privilege escalation to filesystem read-access via automatic ConfigProvider
https://notcve.org/view.php?id=CVE-2024-31141
19 Nov 2024 — Files or Directories Accessible to External Parties, Improper Privilege Management vulnerability in Apache Kafka Clients. Apache Kafka Clients accept configuration data for customizing behavior, and includes ConfigProvider plugins in order to manipulate these configurations. Apache Kafka also provides FileConfigProvider, DirectoryConfigProvider, and EnvVarConfigProvider implementations which include the ability to read from disk or environment variables. In applications where Apache Kafka Clients configurat... • https://lists.apache.org/thread/9whdzfr0zwdhr364604w5ssnzmg4v2lv • CWE-269: Improper Privilege Management CWE-552: Files or Directories Accessible to External Parties •