Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insecure version of zlib.dll used (1.2.8.0) #2934

Closed
4 tasks done
rkoelbel opened this issue Jun 15, 2020 · 2 comments
Closed
4 tasks done

Insecure version of zlib.dll used (1.2.8.0) #2934

rkoelbel opened this issue Jun 15, 2020 · 2 comments
Labels
Milestone

Comments

@rkoelbel
Copy link

rkoelbel commented Jun 15, 2020

Description

Unfortunately we cannot use librdkafka anymore because it uses an insecure version of zlib.dll. For details see https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-1820/GNU-Zlib.html

How to reproduce

Check version of zlib.dll (1.2.8.0)

Checklist

Please provide the following information:

  • librdkafka version (release number or git tag): 1.4.2
  • Apache Kafka version: 2.5.0
  • Operating system: Windows 10 (x64)
  • Critical issue
@rkoelbel rkoelbel changed the title Insecure version of zlib.dll used Insecure version of zlib.dll used (1.2.8.0) Jun 15, 2020
@edenhill edenhill added this to the v1.6.0 milestone Jul 7, 2020
@edenhill edenhill modified the milestones: v1.5.2, v1.6.0 Sep 17, 2020
@edenhill edenhill modified the milestones: v1.6.0, v1.7.0 Jan 27, 2021
@edenhill edenhill modified the milestones: v1.7.0, v1.8.0 Apr 16, 2021
@faiz-usmani
Copy link

@edenhill this issue will certainly turn up as a matter of concern for most production set-ups using librdkafka.
The issue is actually wider on the producer end, where the chances of a Windows machine is much higher, compared to a server side Consumer build.
On that note, is this something that is surely being fixed for version 1.8.0, and if so what is the tentative date for version 1.8.0's release?

@edenhill
Copy link
Contributor

edenhill commented Jul 9, 2021

Yes this will be fixed in v1.8.0 which is scheduled for August.

CVEs:

  • CVE-2016-9840: undefined behaviour (compiler dependent) in inflate (decompression) code: this is used by the librdkafka consumer. Risk of successfully exploiting through consumed messages very low.
  • CVE-2016-9841: undefined behaviour (compiler dependent) in inflate code: this is used by the librdkafka consumer. Risk of successfully exploiting through consumed messages seems very low.
  • CVE-2016-9842: undefined behaviour in inflateMark(): this API is not used by librdkafka
  • CVE-2016-9843: issue in crc32_big() which is called from crc32_z(): this API is not used by librdkafka.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants