Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJDuW=AhXUDhK4Xo-rZbUT2JhaYkaJDx2-f0N5R-E+KMWjmSpQ@mail.gmail.com>
Date: Wed, 10 Jul 2019 14:25:40 -0700
From: Jason Gustafson <jason@...fluent.io>
To: security@...ka.apache.org, oss-security@...ts.openwall.com, 
	announce@...che.org, Users <users@...ka.apache.org>, dev <dev@...ka.apache.org>, 
	kafka-clients <kafka-clients@...glegroups.com>
Subject: CVE-2018-17196: Potential to bypass transaction/idempotent ACL checks
 in Apache Kafka

CVE-2018-17196: Potential to bypass transaction/idempotent ACL checks in
Apache Kafka

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected: Apache Kafka 0.11.0.0 - 2.1.0

Description: It is possible to manually craft a Produce request which
bypasses transaction/idempotent ACL validation. Only authenticated clients
with Write permission on the respective topics are able to exploit this
vulnerability.

Mitigation: Apache Kafka users should upgrade to 2.1.1 or later where this
vulnerability has been fixed.

Acknowledgements: This issue was reported by Jason Gustafson


Regards,
Jason

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.