Replies: 17 comments 37 replies
-
Just FYI ... Strimzi Kafka Bridge 0.21.0 is now available. It will be also used in the upcoming 0.27.0 and 0.26.1 releases of Strimzi Operators. The main changes in this release are support for Arm64 / AArch64 architecture and the fix for the Log4j2 CVE-2021-44228. For more details, go to https://github.com/strimzi/strimzi-kafka-bridge/releases/tag/0.21.0 If you use an older version of the Strimzi Cluster Operator which uses Strimzi Kafka Bridge 0.20.x, you should be able to run the 0.21.0 version without any problems. Just edit the Cluster Operator deployment and set the Thanks to everyone who contributed to this release! |
Beta Was this translation helpful? Give feedback.
-
FYI: It looks like the original way did not worked properly for Cruise Control. Please check the updated document above with the new working way to set the mitigating system property. |
Beta Was this translation helpful? Give feedback.
-
Thanks for the information! Do you happen to know what a potential attack would look like? We only have a broker endpoint exposed to clients. Is there a way to write to the cluster operator log? |
Beta Was this translation helpful? Give feedback.
-
Any ETA on Operator release > 0.26.0 for CruiseControl fix ? (And the helm chart) |
Beta Was this translation helpful? Give feedback.
-
Strimzi Operators release 0.26.1 is now available. The main change in this release is the fix for the Log4j2 CVE-2021-44228. For more details, go to https://github.com/strimzi/strimzi-kafka-operator/releases/tag/0.26.1 The updates to OperatorHub.io and OpenShift OperatorHub are still work in progress. The Java artifacts might need some additional time to propagate. If you for some reason cannot upgrade to Strimzi 0.26.1, you can check the possible mitigations in the top post. Thanks to everyone who contributed to this release! |
Beta Was this translation helpful? Give feedback.
-
For Helm users, the commit you need in order to add a custom/extra environment variable ( For now the best move would presumably be to upgrade your Operator release in your existing |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Will settings the environmental variable |
Beta Was this translation helpful? Give feedback.
-
The release notes for 0.26 states removal of kafka 2.7, is there a release patch for any versions involving kafka 2.7.x ? |
Beta Was this translation helpful? Give feedback.
-
We put together a blog post summarising the Log4j2 issue impact on Strimzi and the available mitigations. so if you are interested, have a read: https://strimzi.io/blog/2021/12/14/strimzi-and-log4shell/ |
Beta Was this translation helpful? Give feedback.
-
Thanks for all this info! |
Beta Was this translation helpful? Give feedback.
-
sorry for the repeat post. But after I upgraded our cluster from 0.25 to 0.26.1 using helm: |
Beta Was this translation helpful? Give feedback.
-
Hi there! For your general information the mitigation used on the operator for CVE-2021-44228 is no longer consider safe. Lunasec has been giving valuable information on the disclosure of the newly found CVE-2021-45046 which implies a complete removal of the JDNI and the messagelookup feature. Please see here: |
Beta Was this translation helpful? Give feedback.
-
Ref: https://kafka.apache.org/cve-list Summary: |
Beta Was this translation helpful? Give feedback.
-
Is Kafka Connect (v0.26.0) impacted by the log4j issue? Pls ignore, see the answer in the blog that kafka connect is not impacted. |
Beta Was this translation helpful? Give feedback.
-
Hi It seems that Log4j 2.17.0 is required to fix it. |
Beta Was this translation helpful? Give feedback.
-
Hi Team, We were on very older version of Strmizi (0.18.0 ) and we are planning to move to 0.27.1. As part of the upgrade , we got to know that we need to first upgrade to 0.22.x and then to desired version. As part of upgrade to 0.22.0 there is an api-conversion utility that needs to be ran : api-conversion-0.22.0.zip. But this util is using an affected log4J core jar (2.13.3), So it is flagged as a issue in our environment. What can be done to avoid this? Can we manually replace log4J core jar to latest version in |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Info for everyone asking about the Log4j2 CVE (CVE-2021-44228) ...
JMSAppender
(which I doubt anyone did with Kafka, since that would be a bit weird) - but it seems this is not the case according to the latest information. So your Kafka brokers, ZooKeeper nodes, Kafka Connects etc. should be most probably fine.If you for any reason cannot upgrade to Strimzi Operators 0.26.1 / Strimzi Kafka Bridge 0.21.0, you should be able to mitigate the CVE in existing versions by setting the Java system property
-Dlog4j2.formatMsgNoLookups=true
...JAVA_OPTS
to-Dlog4j2.formatMsgNoLookups=true
jvmOptions
to set the property:KAFKA_OPTS
using the.spec.cruiseControl.template
section of theKafka
custom resource:JAVA_OPTS
environment variable using the.spec.template
section:When the pods are starting, you should see a line like this:
and there, somewhere after the
java
keyword, you should see the option being set. So you know that it was passed to the pods.(13.12.2021: Updates with a working way for Cruise Control)
(13.12.2021: Updates with a working way for Kafka Bridge)
(13.12.2021: Update for Drain Cleaner which has Log4j2 only as a test dependency)
(14.12.2021: 0.26.1 release)
Beta Was this translation helpful? Give feedback.
All reactions