Search for packages
| purl | pkg:maven/org.apache.kafka/kafka@2.8.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3jvm-ph93-bfch
Aliases: CVE-2021-38153 GHSA-3j6g-hxx5-3q26 |
Information Exposure Through Discrepancy Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. | There are no reported fixed by versions. |
|
VCID-fcsz-ec5x-3kgc
Aliases: CVE-2022-34917 GHSA-c9h3-c6qj-hh7q |
Apache Kafka vulnerability can lead to brokers hitting OutOfMemoryException, causing Denial of Service A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-m3g5-ua28-afd2
Aliases: CVE-2021-26291 GHSA-2f88-5hg8-9x2x |
Origin Validation Error in Apache Maven Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-03T21:27:50.109598+00:00 | GitLab Importer | Affected by | VCID-fcsz-ec5x-3kgc | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.kafka/kafka/CVE-2022-34917.yml | 38.1.0 |
| 2026-04-02T12:38:17.549846+00:00 | GitLab Importer | Affected by | VCID-m3g5-ua28-afd2 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.kafka/kafka/CVE-2021-26291.yml | 38.0.0 |
| 2026-04-01T16:03:29.137101+00:00 | GHSA Importer | Affected by | VCID-fcsz-ec5x-3kgc | https://github.com/advisories/GHSA-c9h3-c6qj-hh7q | 38.0.0 |
| 2026-04-01T12:48:52.266746+00:00 | GitLab Importer | Affected by | VCID-3jvm-ph93-bfch | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.kafka/kafka/CVE-2021-38153.yml | 38.0.0 |