You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@kafka.apache.org by mj...@apache.org on 2020/08/19 23:23:59 UTC
[kafka-site] branch asf-site updated: MINOR: remove unreleaed
versions from CVE page (#298)
This is an automated email from the ASF dual-hosted git repository.
mjsax pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/kafka-site.git
The following commit(s) were added to refs/heads/asf-site by this push:
new 42f6c85 MINOR: remove unreleaed versions from CVE page (#298)
42f6c85 is described below
commit 42f6c859e77826d7c305bbc6cb70c1ab40533416
Author: Matthias J. Sax <ma...@confluent.io>
AuthorDate: Wed Aug 19 16:23:48 2020 -0700
MINOR: remove unreleaed versions from CVE page (#298)
Reviewer: Ismael Juma <is...@confluent.io>
---
cve-list.html | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/cve-list.html b/cve-list.html
index 3d3336e..ec22cfa 100644
--- a/cve-list.html
+++ b/cve-list.html
@@ -19,7 +19,7 @@ connector configuration property value (the externalized secret variable is not
whole configuration property value), then any client can issue a request to
the same Connect cluster to obtain the connector's task configurations and
the response will contain the plaintext secret rather than the externalized secrets variable.
-Users should upgrade to 2.0.2 or higher, 2.1.2 or higher, 2.2.2 or higher, or 2.3.1 or higher
+Users should upgrade to 2.2.2 or higher, or 2.3.1 or higher
where this vulnerability has been fixed.</p>
<table class="data-table">
@@ -30,7 +30,7 @@ where this vulnerability has been fixed.</p>
</tr>
<tr>
<td>Fixed versions</td>
- <td>2.0.2, 2.1.2, 2.2.2, 2.3.1 and later</td>
+ <td>2.2.2, 2.3.1 and later</td>
</tr>
<tr>
<td>Impact</td>