You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@kafka.apache.org by "Zach Fry (Jira)" <ji...@apache.org> on 2022/09/29 16:28:00 UTC

[jira] [Created] (KAFKA-14267) CVE-2022-36944 - Scala deserialization bug

Zach Fry created KAFKA-14267:
--------------------------------

             Summary: CVE-2022-36944 - Scala deserialization bug
                 Key: KAFKA-14267
                 URL: https://issues.apache.org/jira/browse/KAFKA-14267
             Project: Kafka
          Issue Type: Bug
            Reporter: Zach Fry


[https://nvd.nist.gov/vuln/detail/CVE-2022-36944]
{quote}Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with LazyList object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
{quote}
 

It looks like the default scala version used to build kafka on trunk is [https://github.com/apache/kafka/blob/trunk/gradle/dependencies.gradle#L31.] 

I'm not super sure what the kafka EOL policy is, but if we could get this backported to the 2.8 branch as well that'd be fantastic. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)