First published: Tue Jan 17 2023(Updated: )
Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. <br>This release of Red Hat AMQ Streams 2.3.0 serves as a replacement for Red Hat AMQ Streams 2.2.0, and includes security and bug fixes, and enhancements.<br>Security Fix(es):<br><li> http2-server: Invalid HTTP/2 requests cause DoS (CVE-2022-2048)</li> <li> jetty-server: Improper release of ByteBuffers in SslConnections (CVE-2022-2191)</li> <li> jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)</li> <li> jackson-databind: use of deeply nested arrays (CVE-2022-42004)</li> <li> jetty-<a href="http:" target="_blank">http:</a> improver hostname input handling (CVE-2022-2047)</li> <li> snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat AMQ Streams |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0189 is classified as critical due to potential vulnerabilities that could affect system security.
To fix RHSA-2023:0189, you should update your Red Hat AMQ Streams installation to the latest version provided by the advisory.
RHSA-2023:0189 addresses multiple vulnerabilities that could allow unauthorized access or data exposure.
RHSA-2023:0189 specifically applies to Red Hat AMQ Streams 2.3.0 and surrounding versions that may be affected by these vulnerabilities.
You can verify if your system is affected by checking the version of Red Hat AMQ Streams you are currently running against the details in RHSA-2023:0189.