Excellent Luke

I will take a look shortly



On Fri, Jan 28, 2022 at 11:12 PM Luke Chen <show...@gmail.com> wrote:

> Hi Israel and all,
>
> The PR to add CVE-2022-23302
> <https://github.com/advisories/GHSA-w9p3-5cr8-m3jj> and CVE-2022-23305
> <https://github.com/advisories/GHSA-65fg-84f6-3jq3> is here:
> https://github.com/apache/kafka-site/pull/396
>
> Welcome to review.
>
> Thank you.
> Luke
>
> On Sat, Jan 29, 2022 at 11:22 AM Israel Ekpo <israele...@gmail.com> wrote:
>
> > Thanks Luke for the prompt response
> >
> > +1 on the PR for the CVE page update
> >
> > You can cc me on the PR when it’s ready and I will take a look at it
> >
> > Thanks
> >
> > On Fri, Jan 28, 2022 at 9:44 PM Luke Chen <show...@gmail.com> wrote:
> >
> > > Hi Karupasamy,
> > >
> > > Thanks for your asking. Answering your question below:
> > >
> > > > 1. Are the CVEs *CVE-2022-23302, CVE-2022-23305* applicable to the
> > Apache
> > > Kafka?
> > >
> > > Unfortunately, yes, these 2 CVEs: *CVE-2022-23302, CVE-2022-23305* are
> > also
> > > applicable to the Apache Kafka,
> > > because that applied to log4j 1.x version.
> > >
> > > > If so, how to mitigate these vulnerabilities, and will be there be
> any
> > > patch/fix that will be released?
> > >
> > > Yes, the community is working on a KIP to upgrade log4j 1 to log4j 2.
> You
> > > can check its status here: KAFKA-9366
> > > <https://issues.apache.org/jira/browse/KAFKA-9366>
> > >
> > >
> > > > 2. If not vulnerable, Can we remove the following vulnerable classes
> > from
> > > the log4j jar?
> > >
> > >
> > >
> > >                 zip -q -d log4j-*.jar
> org/apache/log4j/net/JMSSink.class
> > >
> > >                 zip -q -d log4j-*.jar
> > > org/apache/log4j/jdbc/JDBCAppender.class
> > >
> > >
> > > Yes, I think so. This is. Kafka doesn't use JMSSink or JDBCAppender at
> > all.
> > >
> > >
> > > > 3. Will there be any impact on Kafka's functionalities after removing
> > the
> > > above-mentioned classes?
> > >
> > > No. Kafka doesn't use JMSSink or JDBCAppender at all.
> > >
> > >
> > > I'm going to submit a PR to add these 2 CVEs into cve-list page:
> > > https://kafka.apache.org/cve-list.
> > > I think there should be other users have the same questions.
> > >
> > > Thank you.
> > > Luke
> > >
> > >
> > > On Fri, Jan 28, 2022 at 9:36 PM Karupasamy S
> > > <karupasam...@ericsson.com.invalid> wrote:
> > >
> > > > Hi Team,
> > > >
> > > >
> > > >
> > > >                 Kindly awaiting your response, as this issue needs to
> > be
> > > > mitigated before our product release to the market in the coming
> days.
> > > >
> > > >
> > > >
> > > > Thanks & Regards
> > > >
> > > > Karupasamy
> > > >
> > > >
> > > >
> > > > *From:* Karupasamy S
> > > > *Sent:* Thursday, January 27, 2022 4:12 PM
> > > > *To:* users@kafka.apache.org
> > > > *Cc:* Mariappan Thangavel <mariappan.thanga...@ericsson.com>
> > > > *Subject:* Apache log4j 1.x vulnerability mitigations on Kafka
> > > >
> > > >
> > > >
> > > > Hi Team,
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >                 We are using Apache Kafka as part of the ELK stack
> and
> > we
> > > > have an internal tool to find the vulnerabilities present on all the
> > > > products/3pp which we use in our product.
> > > >
> > > >
> > > >
> > > >                 So we received the below vulnerabilities on log4j:
> > > >
> > > >
> > > >
> > > > *                CVE-2022-23302, CVE-2022-23305, CVE-2022-23307*
> > > >
> > > >
> > > >
> > > >                 Since Kafka is using log4j internally we are also
> > > > applicable to these vulnerabilities. Hence our security team is
> asking
> > us
> > > > to mitigate these vulnerabilities before releasing our product to the
> > > > market.
> > > >
> > > >
> > > >
> > > >                 On analyzing further, we found for the CVE *
> > > > CVE-2022-23307*, there is a mitigation plan proposed by Kafka, in the
> > > > below-mentioned article:
> > > >
> > > >                 https://kafka.apache.org/cve-list
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >                 But in the same article we, didn’t find any
> information
> > > > for the CVEs *CVE-2022-23302, CVE-2022-23305*.
> > > >
> > > >
> > > >
> > > >                 So kindly help us in clarifying the below queries:
> > > >
> > > >
> > > >
> > > >    1. Are the CVEs *CVE-2022-23302, CVE-2022-23305* applicable to the
> > > >    Apache Kafka? If so, how to mitigate these vulnerabilities, and
> will
> > > be
> > > >    there be any patch/fix that will be released?
> > > >
> > > >
> > > >
> > > >    1. If not vulnerable, Can we remove the following vulnerable
> classes
> > > >    from the log4j jar?
> > > >
> > > >
> > > >
> > > >                 zip -q -d log4j-*.jar
> > org/apache/log4j/net/JMSSink.class
> > > >
> > > >                 zip -q -d log4j-*.jar
> > > > org/apache/log4j/jdbc/JDBCAppender.class
> > > >
> > > >
> > > >
> > > >    1. Will there be any impact on Kafka's functionalities after
> > removing
> > > >    the above-mentioned classes?
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > Thanks & Regards
> > > >
> > > > Karupasamy
> > > >
> > > >
> > > >
> > >
> > --
> > Israel Ekpo
> > Lead Instructor, IzzyAcademy.com
> > https://www.youtube.com/c/izzyacademy
> > https://izzyacademy.com/
> >
>
-- 
Israel Ekpo
Lead Instructor, IzzyAcademy.com
https://www.youtube.com/c/izzyacademy
https://izzyacademy.com/

Reply via email to