You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@kafka.apache.org by "Mickael Maison (Jira)" <ji...@apache.org> on 2022/09/02 09:18:00 UTC
[jira] [Created] (KAFKA-14198) Release package contains snakeyaml 1.30
Mickael Maison created KAFKA-14198:
--------------------------------------
Summary: Release package contains snakeyaml 1.30
Key: KAFKA-14198
URL: https://issues.apache.org/jira/browse/KAFKA-14198
Project: Kafka
Issue Type: Improvement
Affects Versions: 3.3.0
Reporter: Mickael Maison
snakeyaml 1.30 is vulnerable to CVE-2022-25857: https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
It looks like we pull this dependency because of swagger. It's unclear how or even if this can be exploited in Kafka but it's flagged by scanning tools.
I wonder if we could make the swagger dependency compile time only and avoid shipping them.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)