First published: Thu Jan 20 2022(Updated: )
Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. <br>This release of Red Hat AMQ Streams 1.6.6 serves as a replacement for Red Hat AMQ Streams 1.6.5, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients (CVE-2021-38153)</li> <li> log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern (CVE-2021-45105)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat AMQ Streams |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0219 is classified as moderate.
To fix RHSA-2022:0219, update Red Hat AMQ Streams to the latest version 1.6.6 or later.
RHSA-2022:0219 affects Red Hat AMQ Streams based on Apache Kafka.
RHSA-2022:0219 addresses security vulnerabilities and enhances the stability of Red Hat AMQ Streams.
There are no specific workarounds for RHSA-2022:0219; the recommended action is to apply the security update.