Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Version of commons.io used has a high-severity vulnerability #270

Open
kjohn1922 opened this issue Sep 1, 2022 · 1 comment
Open

Version of commons.io used has a high-severity vulnerability #270

kjohn1922 opened this issue Sep 1, 2022 · 1 comment

Comments

@kjohn1922
Copy link

Found when scanning an image with JFrog XRAY that pulls in kafka-connect-storage-common.

XRAY-125253
Severity: High
Type: Security
Summary: Apache Commons IO input/InfiniteCircularInputStream.java InfiniteCircularInputStream::read() Function Buffer Handling Divide-by-zero DoS
Description: Apache Commons IO contains a divide-by-zero condition in the InfiniteCircularInputStream::read() function in input/InfiniteCircularInputStream.java that is triggered when the input buffer is of size 0. This may allow a context-dependent attacker to crash a process linked against the library.
Version: 2.7
Fix version: 2.8.0

https://issues.apache.org/jira/browse/IO-675

kafka-connect-storage-common is using version 2.7 of commons.io, as seen here: https://github.com/confluentinc/kafka-connect-storage-common/blob/master/pom.xml#L70

Solution: Upgrade dependency version to 2.8.0 or later.

@janjwerner-confluent
Copy link
Member

Thank you for bringing this to our attention.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants