git: a991db5e17fa - main - security/vuxml: Record kafka vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 10 Dec 2023 17:09:11 UTC
The branch main has been updated by fernape:
URL: https://cgit.FreeBSD.org/ports/commit/?id=a991db5e17fa496ec31e0416b8dd8ee357dbee0e
commit a991db5e17fa496ec31e0416b8dd8ee357dbee0e
Author: Fernando Apesteguía <fernape@FreeBSD.org>
AuthorDate: 2023-12-10 17:05:14 +0000
Commit: Fernando Apesteguía <fernape@FreeBSD.org>
CommitDate: 2023-12-10 17:07:55 +0000
security/vuxml: Record kafka vulnerability
Authorization Bypass Through User-Controlled Key vulnerability in Apache
ZooKeeper.
Note that this only affects SASL Quorum Peer authentication which is
not enabled by default.
Base Score: 9.1 CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
PR: 275611
---
security/vuxml/vuln/2023.xml | 42 ++++++++++++++++++++++++++++++++++++++++++
1 file changed, 42 insertions(+)
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 790a48f245fd..4f32c6f80e04 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,45 @@
+ <vuln vid="2bc376c0-977e-11ee-b4bc-b42e991fc52e">
+ <topic>apache -- Apache ZooKeeper: Authorization bypass in SASL Quorum Peer Authentication</topic>
+ <affects>
+ <package>
+ <name>apache</name>
+ <range><lt>3.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@apache.org reports:</p>
+ <blockquote cite="http://www.openwall.com/lists/oss-security/2023/10/11/4">
+ <p>Authorization Bypass Through User-Controlled Key vulnerability in
+ Apache ZooKeeper. If SASL Quorum Peer authentication is enabled
+ in ZooKeeper (quorum.auth.enableSasl=true), the authorization is
+ done by verifying that the instance part in SASL authentication ID
+ is listed in zoo.cfg server list. The instance part in SASL auth
+ ID is optional and if it's missing, like 'eve@EXAMPLE.COM',
+ the authorization check will be skipped.As a result an arbitrary
+ endpoint could join the cluster and begin propagating counterfeit
+ changes to the leader, essentially giving it complete read-write
+ access to the data tree.Quorum Peer authentication is not enabled
+ by default.
+ Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2,
+ which fixes the issue.
+ Alternately ensure the ensemble election/quorum communication is
+ protected by a firewall as this will mitigate the issue.
+ See the documentation for more details on correct cluster administration.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2023-44981</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2023-44981</url>
+ </references>
+ <dates>
+ <discovery>2023-10-11</discovery>
+ <entry>2023-12-10</entry>
+ </dates>
+ </vuln>
+
<vuln vid="bbda3d16-968e-11ee-b780-b42e991fc52e">
<topic>strongswan -- buffer overflow</topic>
<affects>