First published: Thu Aug 19 2021(Updated: )
Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. <br>This release of Red Hat AMQ Streams 1.8.0 serves as a replacement for Red Hat AMQ Streams 1.7.0, and includes security and bug fixes, and enhancements.<br>Security Fix(es):<br><li> snakeyaml: Billion laughs attack via alias feature (CVE-2017-18640)</li> <li> netty: Information disclosure via the local system temporary directory (CVE-2021-21290)</li> <li> netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)</li> <li> netty: Request smuggling via content-length header (CVE-2021-21409)</li> <li> json-smart: uncaught exception may lead to crash or information disclosure (CVE-2021-27568)</li> <li> jetty: Symlink directory exposes webapp directory contents (CVE-2021-28163)</li> <li> jetty: Ambiguous paths can access WEB-INF (CVE-2021-28164)</li> <li> jetty: Resource exhaustion when receiving an invalid large TLS frame (CVE-2021-28165)</li> <li> jersey: Local information disclosure via system temporary directory (CVE-2021-28168)</li> <li> jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory (CVE-2021-28169)</li> <li> apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425)</li> <li> jetty: SessionListener can prevent a session from being invalidated breaking logout (CVE-2021-34428)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.