You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@kafka.apache.org by "Mickael Maison (Jira)" <ji...@apache.org> on 2022/09/02 09:19:00 UTC
[jira] [Updated] (KAFKA-14198) Release package contains snakeyaml 1.30
[ https://issues.apache.org/jira/browse/KAFKA-14198?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Mickael Maison updated KAFKA-14198:
-----------------------------------
Description:
snakeyaml 1.30 is vulnerable to CVE-2022-25857: https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
It looks like we pull this dependency because of swagger. It's unclear how or even if this can be exploited in Kafka but it's flagged by scanning tools.
I wonder if we could make the swagger dependencies compile time only and avoid shipping them.
was:
snakeyaml 1.30 is vulnerable to CVE-2022-25857: https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
It looks like we pull this dependency because of swagger. It's unclear how or even if this can be exploited in Kafka but it's flagged by scanning tools.
I wonder if we could make the swagger dependency compile time only and avoid shipping them.
> Release package contains snakeyaml 1.30
> ---------------------------------------
>
> Key: KAFKA-14198
> URL: https://issues.apache.org/jira/browse/KAFKA-14198
> Project: Kafka
> Issue Type: Improvement
> Affects Versions: 3.3.0
> Reporter: Mickael Maison
> Priority: Major
>
> snakeyaml 1.30 is vulnerable to CVE-2022-25857: https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360
> It looks like we pull this dependency because of swagger. It's unclear how or even if this can be exploited in Kafka but it's flagged by scanning tools.
> I wonder if we could make the swagger dependencies compile time only and avoid shipping them.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)