[ https://issues.apache.org/jira/browse/CAMEL-19463?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Andrea Cosentino resolved CAMEL-19463. -------------------------------------- Resolution: Invalid > CVE 2023-34455 - Vulnerability identified with Camel-Kafka > ---------------------------------------------------------- > > Key: CAMEL-19463 > URL: https://issues.apache.org/jira/browse/CAMEL-19463 > Project: Camel > Issue Type: Dependency upgrade > Components: camel-kafka > Reporter: Sasikumar Muthukrishnan Sampath > Assignee: Andrea Cosentino > Priority: Minor > > A new vulnerability CVE-2023-34455 is identified with camel-kafka > dependencies. The vulnerability is coming from snappy-java:1.1.8.4 > Version 1.1.10.1 contains a patch for this issue. Please upgrade the > snappy-java version to fix this issue > > snappy-java is a fast compressor/decompressor for Java. Due to use of an > unchecked chunk length, an unrecoverable fatal error can occur in versions > prior to 1.1.10.1. > The code in the function hasNextChunk in the fileSnappyInputStream.java > checks if a given stream has more chunks to read. It does that by attempting > to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function > returns false. Otherwise, if 4 bytes were available, the code treats them as > the length of the next chunk. > In the case that the `compressed` variable is null, a byte array is allocated > with the size given by the input data. Since the code doesn’t test the > legality of the `chunkSize` variable, it is possible to pass a negative > number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a > `java.lang.NegativeArraySizeException` exception. A worse case would happen > when passing a huge positive value (such as 0x7FFFFFFF), which would raise > the fatal `java.lang.OutOfMemoryError` error. > -- This message was sent by Atlassian Jira (v8.20.10#820010)