[ 
https://issues.apache.org/jira/browse/KAFKA-7856?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16751662#comment-16751662
 ] 

Colin P. McCabe commented on KAFKA-7856:
----------------------------------------

I don't see any cryptographic issue here.  The random number generator is being 
used for injecting some randomness into the retry delay.  Even if an attacker 
could predict exactly when retries would happen, there is no security 
implication that I can see.  If you're a bad guy, then just write your own 
client that retries as quickly as possible.

> Cryptographic Issues by Insufficient Entropy
> --------------------------------------------
>
>                 Key: KAFKA-7856
>                 URL: https://issues.apache.org/jira/browse/KAFKA-7856
>             Project: Kafka
>          Issue Type: Bug
>    Affects Versions: 2.1.0
>            Reporter: Victor Sartori
>            Priority: Major
>              Labels: patch, pull-request-available, security
>             Fix For: 2.1.1
>
>
> We pass the kakfa client in security analisys ans this scans reports:
> CWE-331 - Flaw medium,SANS TOP 25
> [https://cwe.mitre.org/data/definitions/331.html]
>  
> A PR on github is present. (https://github.com/apache/kafka/pull/6184)



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to