[ 
https://issues.apache.org/jira/browse/KAFKA-20043?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18050340#comment-18050340
 ] 

Chia-Ping Tsai commented on KAFKA-20043:
----------------------------------------

KAFKA-19951 has already updated the lz4 to 1.10.1. see 
[https://github.com/apache/kafka/pull/21035]";

> Kafka-clients is vulnerable due to CVE-2025-12183, CVE-2025-66566
> -----------------------------------------------------------------
>
>                 Key: KAFKA-20043
>                 URL: https://issues.apache.org/jira/browse/KAFKA-20043
>             Project: Kafka
>          Issue Type: Bug
>            Reporter: Jiyoung Lee
>            Priority: Major
>
> Kafka-clients references `lz4-java` that needs to be updated due to 
> vulnerability issues
> `lz4-java` has to be 1.10.1 or higher to resolve the issue. 
> h2. yawkat LZ4 Java has a possible information leak in Java safe decompressor
> h2. Description
> Insufficient clearing of the output buffer in Java-based decompressor 
> implementations in lz4-java 1.10.0 and earlier allows remote attackers to 
> read previous buffer contents via crafted compressed input. In applications 
> where the output buffer is reused without being cleared, this may lead to 
> disclosure of sensitive data.
> JNI-based implementations are _not_ affected.
> h2. LZ4 Java Compression has Out-of-bounds memory operations which can cause 
> DoS
> h2. Description
> Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow 
> remote attackers to cause denial of service and read adjacent memory via 
> untrusted compressed input.
> This is fixed in a forked release: at.yawk.lz4:lz4-java version 1.8.1. The 
> original project has been archived: [https://github.com/lz4/lz4-java], and 
> Sonatype has added a redirect from org.lz4:lz4-java:1.8.1 to the new group ID.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to