CVE-2021-38153
Summary
| CVE | CVE-2021-38153 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-09-22 09:15:00 UTC |
| Updated | 2023-11-07 03:37:00 UTC |
| Description | Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0. |
Risk And Classification
Problem Types: CWE-203
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [kafka-dev] 20211007 Re: CVE Back Port? | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| [kafka-users] 20211012 [VOTE] 2.6.3 RC0 | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Oracle Critical Patch Update Advisory - April 2022 | MISC | www.oracle.com | |
| [kafka-dev] 20211012 [VOTE] 2.7.2 RC0 | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| Oracle Critical Patch Update Advisory - January 2022 | MISC | www.oracle.com | |
| [kafka-users] 20211012 [VOTE] 2.7.2 RC0 | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| [kafka-dev] 20211026 Re: [kafka-clients] [VOTE] 2.7.2 RC0 | lists.apache.org | ||
| [kafka-dev] 20211012 [VOTE] 2.6.3 RC0 | lists.apache.org | ||
| Apache Kafka | CONFIRM | kafka.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Oracle Critical Patch Update Advisory - July 2022 | N/A | www.oracle.com | |
| [kafka-users] 20211026 Re: [kafka-clients] [VOTE] 2.7.2 RC0 | lists.apache.org | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Apache Kafka would like to thank J. Santilli for reporting this issue.