100 Star 330 Fork 295

openLooKeng / hetu-core

 / 详情

CVE-2023-34453

Todo
CVE和安全问题 成员
创建于  
2023-06-16 10:08

一、漏洞信息
漏洞编号:CVE-2023-34453
漏洞归属组件:hetu-core
漏洞归属的版本:1.1.8.4
CVSS V3.0分值:
BaseScore:7.5 High
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
snappy-java is a fast compressor/decompressor for Java. Due to unchecked multiplications, an integer overflow may occur in versions prior to 1.1.10.1, causing a fatal error.The function shuffle(int[] input) in the file BitShuffle.java receives an array of integers and applies a bit shuffle on it. It does so by multiplying the length by 4 and passing it to the natively compiled shuffle function. Since the length is not tested, the multiplication by four can cause an integer overflow and become a smaller value than the true size, or even zero or negative. In the case of a negative value, a java.lang.NegativeArraySizeException exception will raise, which can crash the program. In a case of a value that is zero or too small, the code that afterwards references the shuffled array will assume a bigger size of the array, which might cause exceptions such as java.lang.ArrayIndexOutOfBoundsException.The same issue exists also when using the shuffle functions that receive a double, float, long and short, each using a different multiplier that may cause the same issue.Version 1.1.10.1 contains a patch for this vulnerability.
漏洞公开时间:2023-06-16 01:15:00
漏洞创建时间:2023-09-08 08:44:22
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2023-34453

更多参考(点击展开)
参考来源 参考链接 来源链接
security-advisories.github.com https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107
security-advisories.github.com https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java
security-advisories.github.com https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905
security-advisories.github.com https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf
redhat_bugzilla https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java https://bugzilla.redhat.com/show_bug.cgi?id=2215393
redhat_bugzilla https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf https://bugzilla.redhat.com/show_bug.cgi?id=2215393
redhat_bugzilla https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 https://bugzilla.redhat.com/show_bug.cgi?id=2215393
redhat_bugzilla https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107 https://bugzilla.redhat.com/show_bug.cgi?id=2215393
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:5165 https://bugzilla.redhat.com/show_bug.cgi?id=2215393
redhat_bugzilla https://access.redhat.com/errata/RHSA-2023:7700 https://bugzilla.redhat.com/show_bug.cgi?id=2215393
debian https://security-tracker.debian.org/tracker/CVE-2023-34453
cve_search https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java
cve_search https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf
cve_search https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905
cve_search https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107
github_advisory https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 https://github.com/advisories/GHSA-pqr6-cmr2-h8hf
github_advisory https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf https://github.com/advisories/GHSA-pqr6-cmr2-h8hf
github_advisory https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107 https://github.com/advisories/GHSA-pqr6-cmr2-h8hf
github_advisory https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java https://github.com/advisories/GHSA-pqr6-cmr2-h8hf
osv https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf https://osv.dev/vulnerability/CVE-2023-34453
osv https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 https://osv.dev/vulnerability/CVE-2023-34453
osv https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107 https://osv.dev/vulnerability/CVE-2023-34453
osv https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java https://osv.dev/vulnerability/CVE-2023-34453
snyk https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 https://security.snyk.io/vuln/SNYK-JAVA-ORGXERIALSNAPPY-5710959
snyk https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107 https://security.snyk.io/vuln/SNYK-JAVA-ORGXERIALSNAPPY-5710959
osv https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf https://osv.dev/vulnerability/GHSA-pqr6-cmr2-h8hf
osv https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 https://osv.dev/vulnerability/GHSA-pqr6-cmr2-h8hf
osv https://github.com/xerial/snappy-java https://osv.dev/vulnerability/GHSA-pqr6-cmr2-h8hf
osv https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107 https://osv.dev/vulnerability/GHSA-pqr6-cmr2-h8hf
osv https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java https://osv.dev/vulnerability/GHSA-pqr6-cmr2-h8hf
nvd https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java
nvd https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf
nvd https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905
nvd https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107
redhat https://access.redhat.com/security/cve/CVE-2023-34453
nvd https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java
nvd https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf
nvd https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905
nvd https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107

漏洞分析指导链接:
https://gitee.com/openlookeng/community/blob/master/security/cve/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 security-advisories.github.com
https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 redhat_bugzilla
https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 github_advisory
https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 osv
https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 snyk
https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107 nvd
https://github.com/xerial/snappy-java/blob/master/src/main/java/org/xerial/snappy/BitShuffle.java nvd
https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905 nvd
https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf nvd

二、漏洞分析结构反馈
影响性分析说明:

openLooKeng评分:
7.5
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.1.9.0:
2.master:

评论 (1)

i-robot 创建了CVE和安全问题
i-robot 添加了
 
CVE/UNFIXED
标签
展开全部操作日志

@tushengxia
issue处理注意事项:
1. 当前issue受影响的分支提交pr时, 须在pr描述中填写当前issue编号进行关联, 否则无法关闭当前issue;
2. 模板内容需要填写完整, 无论是受影响或者不受影响都需要填写完整内容,未引入的分支不需要填写, 否则无法关闭当前issue;
3. 以下为模板中需要填写完整的内容, 请复制到评论区回复, 注: 内容的标题名称(影响性分析说明, openLooKeng评分, 受影响版本排查(受影响/不受影响))不能省略,省略后cve-manager将无法正常解析填写内容.


影响性分析说明:

openLooKeng评分: (评分和向量)

受影响版本排查(受影响/不受影响):
1.1.9.0:
2.master:


issue处理具体操作请参考:
https://gitee.com/openlookeng/community/blob/master/security/cve/doc/md/manual.md
pr关联issue具体操作请参考:
https://gitee.com/help/articles/4142

i-robot 修改了描述
TommyLike 计划开始日期设置为2023-06-16
TommyLike 计划截止日期设置为2023-06-30
TommyLike 优先级设置为主要
i-robot 修改了描述
i-robot 修改了描述
i-robot 修改了描述
i-robot 修改了描述
i-robot 修改了描述
i-robot 修改了描述
i-robot 修改了描述
i-robot 修改了描述
i-robot 修改了描述

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(1)
Java
1
https://gitee.com/openlookeng/hetu-core.git
git@gitee.com:openlookeng/hetu-core.git
openlookeng
hetu-core
hetu-core

搜索帮助