You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@kafka.apache.org by mj...@apache.org on 2020/08/19 23:23:59 UTC

[kafka-site] branch asf-site updated: MINOR: remove unreleaed versions from CVE page (#298)

This is an automated email from the ASF dual-hosted git repository.

mjsax pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/kafka-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 42f6c85  MINOR: remove unreleaed versions from CVE page (#298)
42f6c85 is described below

commit 42f6c859e77826d7c305bbc6cb70c1ab40533416
Author: Matthias J. Sax <ma...@confluent.io>
AuthorDate: Wed Aug 19 16:23:48 2020 -0700

    MINOR: remove unreleaed versions from CVE page (#298)
    
    Reviewer: Ismael Juma <is...@confluent.io>
---
 cve-list.html | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/cve-list.html b/cve-list.html
index 3d3336e..ec22cfa 100644
--- a/cve-list.html
+++ b/cve-list.html
@@ -19,7 +19,7 @@ connector configuration property value (the externalized secret variable is not
 whole configuration property value), then any client can issue a request to 
 the same Connect cluster to obtain the connector's task configurations and 
 the response will contain the plaintext secret rather than the externalized secrets variable.
-Users should upgrade to 2.0.2 or higher, 2.1.2 or higher, 2.2.2 or higher, or 2.3.1 or higher
+Users should upgrade to 2.2.2 or higher, or 2.3.1 or higher
 where this vulnerability has been fixed.</p>
 
 <table class="data-table">
@@ -30,7 +30,7 @@ where this vulnerability has been fixed.</p>
   </tr>
   <tr>
     <td>Fixed versions</td>
-    <td>2.0.2, 2.1.2, 2.2.2, 2.3.1 and later</td>
+    <td>2.2.2, 2.3.1 and later</td>
   </tr>
   <tr>
     <td>Impact</td>