This is an automated email from the ASF dual-hosted git repository.

mimaison pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/kafka-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 69c6b8c01 MINOR: Add CVE-2024-27309 (#621)
69c6b8c01 is described below

commit 69c6b8c01d0a7d08d6dba96588b898d174c7f2f6
Author: Mickael Maison <[email protected]>
AuthorDate: Mon Aug 5 11:43:14 2024 +0200

    MINOR: Add CVE-2024-27309 (#621)
    
    
    Reviewers: Josep Prat <[email protected]>
---
 cve-list.html | 37 +++++++++++++++++++++++++++++++++++++
 1 file changed, 37 insertions(+)

diff --git a/cve-list.html b/cve-list.html
index a160eb3c2..2566530fe 100644
--- a/cve-list.html
+++ b/cve-list.html
@@ -9,6 +9,43 @@
 
 This page lists all security vulnerabilities fixed in released versions of 
Apache Kafka.
 
+      <h2 id="CVE-2024-27309"><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2024-27309";>CVE-2024-27309</a> 
Potential incorrect access control during migration from ZK mode to KRaft 
mode</h2>
+
+      <p> While an Apache Kafka cluster is being migrated from ZooKeeper mode 
to KRaft mode, in some cases ACLs will not be correctly enforced.  Two 
preconditions are needed to trigger the bug:
+        <ol>
+          <li>The administrator decides to remove an ACL
+          <li>The resource associated with the removed ACL continues to have 
two or more other ACLs associated with it after the removal.
+       </ol>
+        When those two preconditions are met, Kafka will treat the resource as 
if it had only one ACL associated with it after the removal, rather than the 
two or more that would be correct.
+        The incorrect condition is cleared by removing all brokers in ZK mode, 
or by adding a new ACL to the affected resource. Once the migration is 
completed, there is no metadata loss (the ACLs all remain).
+      </p>
+
+      <table class="data-table">
+        <tbody>
+        <tr>
+          <td>Versions affected</td>
+          <td>3.5.0 - 3.6.1</td>
+        </tr>
+        <tr>
+          <td>Fixed versions</td>
+          <td>3.6.2</td>
+        </tr>
+        <tr>
+          <td>Impact</td>
+          <td>The impact depends on the ACLs in use. If only ALLOW ACLs were 
configured during the migration, the impact would be limited to availability 
impact. if DENY ACLs were configured, the impact could include confidentiality 
and integrity impact depending on the ACLs configured, as the DENY ACLs might 
be ignored due to this vulnerability during the migration period.
+          </td>
+        </tr>
+        <tr>
+          <td>Advice</td>
+          <td>We advise all Kafka users using ACLs to only perform ZooKeeper 
to KRaft migrations when using Kafka 3.6.2 or above.</td>
+        </tr>
+        <tr>
+          <td>Issue announced</td>
+          <td>12 Apr 2024</td>
+        </tr>
+        </tbody>
+      </table>
+
       <h2 id="CVE-2023-34455"><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-34455";>CVE-2023-34455</a> 
Clients using Snappy compression may cause out of memory error on brokers</h2>
 
       <p> This CVE identifies a vulnerability in snappy-java which could be 
used to cause an Out-of-Memory (OOM) condition, leading to 
Denial-of-Service(DoS) on the Kafka broker.

Reply via email to