You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@kafka.apache.org by "Mickael Maison (Jira)" <ji...@apache.org> on 2022/09/02 09:19:00 UTC

[jira] [Updated] (KAFKA-14198) Release package contains snakeyaml 1.30

     [ https://issues.apache.org/jira/browse/KAFKA-14198?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Mickael Maison updated KAFKA-14198:
-----------------------------------
    Description: 
snakeyaml 1.30 is vulnerable to CVE-2022-25857: https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360

It looks like we pull this dependency because of swagger. It's unclear how or even if this can be exploited in Kafka but it's flagged by scanning tools. 

I wonder if we could make the swagger dependencies compile time only and avoid shipping them. 

  was:
snakeyaml 1.30 is vulnerable to CVE-2022-25857: https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360

It looks like we pull this dependency because of swagger. It's unclear how or even if this can be exploited in Kafka but it's flagged by scanning tools. 

I wonder if we could make the swagger dependency compile time only and avoid shipping them. 


> Release package contains snakeyaml 1.30
> ---------------------------------------
>
>                 Key: KAFKA-14198
>                 URL: https://issues.apache.org/jira/browse/KAFKA-14198
>             Project: Kafka
>          Issue Type: Improvement
>    Affects Versions: 3.3.0
>            Reporter: Mickael Maison
>            Priority: Major
>
> snakeyaml 1.30 is vulnerable to CVE-2022-25857: https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
> It looks like we pull this dependency because of swagger. It's unclear how or even if this can be exploited in Kafka but it's flagged by scanning tools. 
> I wonder if we could make the swagger dependencies compile time only and avoid shipping them. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)