이 콘텐츠는 선택한 언어로 제공되지 않습니다.

Chapter 6. Fixed issues


The following sections list the issues fixed in AMQ Streams 1.8.x. Red Hat recommends that you upgrade to the latest patch release

For details of the issues fixed in Kafka 2.8.0, refer to the Kafka 2.8.0 Release Notes.

6.1. Fixed issues for AMQ Streams 1.8.4

The AMQ Streams 1.8.4 patch release is now available.

The AMQ Streams product images have been upgraded to version 1.8.4.

For additional details about the issues resolved in AMQ Streams 1.8.4, see AMQ Streams 1.8.x Resolved Issues.

Log4j2 vulnerability

The 1.8.4 release fixes a remote code execution vulnerability for AMQ Streams components that use log4j2. The vulnerability could allow a remote code execution on the server if the system logs a string value from an unauthorized source. This affects log4j versions between 2.0 and 2.14.1.

For more information, see CVE-2021-44228.

6.2. Fixed issues for AMQ Streams 1.8.0

Expand
Issue NumberDescription

ENTMQST-1529

FileStreamSourceConnector stops when using a large file.

ENTMQST-2359

Kafka Bridge does not handle assignment and subscription.

ENTMQST-2453

The kafka-exporter pod restarts for no reason.

ENTMQST-2459

Running Kafka Exporter leads to high CPU usage.

ENTMQST-2511

Fine tune the health checks to stop Kafka Exporter restarting during rolling updates.

ENTMQST-2777

ENTMQST-2777 Custom Bridge labels are not set when the service template is not specified.

ENTMQST-2974

Changing the log level for Kafka Connect connectors only works temporarily.

Expand
Table 6.1. Fixed common vulnerabilities and exposures (CVEs)
Issue NumberDescription

ENTMQST-1934

CVE-2020-9488 log4j: improper validation of certificate with host mismatch in SMTP appender [amq-st-1].

ENTMQST-2613

CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads [amq-st-1].

ENTMQST-2617

CVE-2021-21290 netty: Information disclosure via the local system temporary directory [amq-st-1].

ENTMQST-2647

CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation [amq-st-1].

ENTMQST-2663

CVE-2021-27568 json-smart: uncaught exception may lead to crash or information disclosure [amq-st-1].

ENTMQST-2711

ENTMQST-2711 CVE-2021-21409 netty: Request smuggling via content-length header [amq-st-1].

ENTMQST-2821

CVE-2021-28168 jersey-common: jersey: Local information disclosure via system temporary directory [amq-st-1].

ENTMQST-2867

CVE-2021-29425 commons-io: apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 [amq-st-1].

ENTMQST-2908

ENTMQST-2908 CVE-2021-28165 jetty-server: jetty: Resource exhaustion when receiving an invalid large TLS frame [amq-st-1].

ENTMQST-2909

CVE-2021-28164 jetty-server: jetty: Ambiguous paths can access WEB-INF [amq-st-1].

ENTMQST-2910

CVE-2021-28163 jetty-server: jetty: Symlink directory exposes webapp directory contents [amq-st-1].

ENTMQST-2980

CVE-2021-28169 jetty-server: jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory [amq-st-1].

ENTMQST-3023

CVE-2021-34428 jetty-server: jetty: SessionListener can prevent a session from being invalidated breaking logout [amq-st-1].

Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동