Gentle reminder!

-----Original Message-----
From: Sahil Sharma D 
Sent: 03 July 2023 04:39 PM
To: users@kafka.apache.org
Subject: RE: Release plan required for version 3.5.1

Hi,

That means below vulnerabilities are not appliable for kafka, right?
CVE-2022-42003
CVE-2022-42004
CVE-2023-34454
CVE-2023-34453
CVE-2023-35116

Regards,
Sahil

-----Original Message-----
From: Josep Prat <josep.p...@aiven.io.INVALID>
Sent: 03 July 2023 02:02 PM
To: users@kafka.apache.org
Subject: Re: Release plan required for version 3.5.1

Hi Sahil,
Thanks for caring about Apache Kafka's security. One can fix this situation by 
replacing the affected jar file with the one containing the fix for the 
vulnerabilities. We plan to add a write up under Apache Kafka's CVE page.
Mind that Apache Kafka  doesn't typically do emergency releases for CVEs 
discovered in their dependencies unless affectation in Kafka itself is major.

That being said, if you take a look at the `dev` mailing list, you'll see that 
a maintainer already volunteered to be the release manager for 3.5.1:
https://lists.apache.org/thread/q8rxv7wo8mwvzs3d25hzy987xph7f7nr
If you want to be up-to-date with the release plan of 3.5.1 (contents, 
estimated timings and such) please check the `dev` mailing list as this 
information is usually shared there. The `user` mailing list usually gets 
notified when release candidates or new versions are created.

Best,

On Mon, Jul 3, 2023 at 9:46 AM Sahil Sharma D 
<sahil.d.sha...@ericsson.com.invalid> wrote:

> Gentle reminder!
>
> From: Sahil Sharma D
> Sent: 26 June 2023 08:18 PM
> To: users@kafka.apache.org
> Subject: Release plan required for version 3.5.1
> Importance: High
>
> Hi Team,
>
> There is an vulnerability on snappy-java-1.1.8.4.jar, are we impacted 
> due to this if we are using only client jar and kafka server.
>
> Below are the vulnerabilities that still open and we unable to find 
> any detail of these CVEs on jira. In which version these CVEs are 
> planned to be resolved?
> CVE-2022-42003
> CVE-2022-42004
> CVE-2023-34454
> CVE-2023-34453
> CVE-2023-35116
>
> Kindly share the release plan for version 3.5.1.
>
> Regards,
> Sahil
>


--
[image: Aiven] 
<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-4fde1f84294d975c&q=1&e=2478bc68-679b-40d9-944b-4cde1de3c2b7&u=https%3A%2F%2Fwww.aiven.io%2F>

*Josep Prat*
Open Source Engineering Director, *Aiven*
josep.p...@aiven.io   |   +491715557497
aiven.io 
<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-4fde1f84294d975c&q=1&e=2478bc68-679b-40d9-944b-4cde1de3c2b7&u=https%3A%2F%2Fwww.aiven.io%2F>
   |   
<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-83e1421cb9381159&q=1&e=2478bc68-679b-40d9-944b-4cde1de3c2b7&u=https%3A%2F%2Fwww.facebook.com%2Faivencloud>
  <https://www.linkedin.com/company/aiven/>   <https://twitter.com/aiven_io>
*Aiven Deutschland GmbH*
Alexanderufer 3-7, 10117 Berlin
Geschäftsführer: Oskari Saarenmaa & Hannu Valtonen Amtsgericht Charlottenburg, 
HRB 209739 B

Reply via email to