Bug 2215393 (CVE-2023-34453)
Summary: | CVE-2023-34453 snappy-java: Integer overflow in shuffle leads to DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aileenc, anstephe, avibelli, bbuckingham, bcourt, bgeorges, chazlett, clement.escoffier, dandread, dfreiber, dkreling, dsimansk, ehelms, gmalinko, gsmet, hhorak, janstey, jburrell, jcantril, jmartisk, jorton, jross, jscholz, jsherril, lball, lthon, lzap, matzew, max.andersen, mhulan, mizdebsk, myarboro, nmoumoul, orabin, pcreech, peholase, pgallagh, pjindal, probinso, rchan, rhuss, rogbas, rruss, rsvoboda, sbiarozk, swoodman, tqvarnst, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | snappy-java 1.1.10.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Snappy-java's shuffle function, which does not check input sizes before beginning operations. This issue could allow an attacker to send malicious input to trigger an overflow error that crashes the program, resulting in a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2215396, 2215397, 2215398, 2216103, 2216104 | ||
Bug Blocks: | 2215395 |
Description
Guilherme de Almeida Suckevicz
2023-06-15 19:28:15 UTC
This issue has been addressed in the following products: Red Hat AMQ Streams 2.5.0 Via RHSA-2023:5165 https://access.redhat.com/errata/RHSA-2023:5165 This issue has been addressed in the following products: Red Hat build of Quarkus 2.13.9 Via RHSA-2023:7700 https://access.redhat.com/errata/RHSA-2023:7700 |