AMQ Streams 2.2.x Resolved Issues

Updated -

The AMQ Streams 2.2.2 release is now available for download from the Customer Portal and Red Hat Container Catalog. AMQ Streams 2.2.2 is a patch release for AMQ Streams 2.2.0. Note, AMQ Streams patches are cumulative and include fixes from previous patch releases as noted below.


The following issues have been resolved in the AMQ Streams 2.2.2 release:

ID Component Summary
ENTMQST-5373 [Major Incident] CVE-2023-44487 netty-codec-http2: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) [amq-st-2]


The following issues have been resolved in the AMQ Streams 2.2.1 release:

ID Component Summary
ENTMQST-4728 [KAFKA] MM2 connector task stopped and didn’t result in failed state
ENTMQST-4766 [amq-st-2.2] CVE-2023-25194 - POSSIBLE RCE/DENIAL OF SERVICE ATTACK VIA SASL JAAS JNDI LOGIN MODULE CONFIGURATION USING KAFKA CONNECT
ENTMQST-4691 [amq-st-2.2] CVE-2023-0833 okhttp: Red Hat A-MQ Streams: component version with information disclosure flaw
ENTMQST-4282 [PROD] Missing sources for Kubernetes client 5.12.0 related artifacts
ENTMQST-4785 [amq-st-2.2] CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
ENTMQST-4787 [amq-st-2.2] CVE-2022-42004 jackson-databind: use of deeply nested arrays
ENTMQST-4788 [amq-st-2.4] CVE-2022-42004 jackson-databind: use of deeply nested arrays
ENTMQST-4791 [amq-st-2.2] CVE-2022-36944 Scala 2.13.x before 2.13.9 has a Java deserialization risk via a gadget chain
ENTMQST-4790 [amq-st-2.2] CVE-2022-38752 snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
ENTMQST-4789 [amq-st-2.2] CVE-2022-41854 dev-java/snakeyaml: DoS via stack overflow
ENTMQST-4794 [amq-st-2.2] CVE-2023-25194: Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration using Kafka Connect
ENTMQST-4792 [amq-st-2.2] CVE-2022-25647 com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
ENTMQST-4793 [amq-st-2.2] CVE-2022-2047 jetty-http: improver hostname input handling

Comments