5.4.3 Release Notes
These release notes list any new features, enhancements, fixes, and breaking changes implemented between version 5.4.2 and version 5.4.3 of Hazelcast Platform.
Release date: 2025-08-26
This is a maintenance release for Enterprise Edition.
For help downloading Hazelcast Enterprise Edition, see Installing Hazelcast Enterprise Edition or request a trial license key.
Security
-
Security Fix for CVE-2024-13009 – Request body data leakage via Jetty GzipHandler in Jetty server library: Resolved CVE-2024-13009, a high-severity vulnerability in
org.eclipse.jetty:jetty-server
whereGzipHandler
may incorrectly release buffers on gzip inflate errors, potentially causing parts of a request body to be exposed to subsequent requests. -
Security Fix for CVE-2025-24970 – Native crash via Netty SslHandler input validation: Resolved CVE-2025-24970, a high-severity vulnerability in
io.netty:netty-handler
whereSslHandler
may not correctly validate specially crafted packets when using the nativeSSLEngine
, leading to a potential native process crash. -
Security Fix for CVE-2025-27817 – Arbitrary file read and SSRF via Kafka OAUTHBEARER endpoints in kafka-clients: Resolved CVE-2025-27817, a moderate vulnerability in
org.apache.kafka:kafka-clients
where untrusted configuration ofsasl.oauthbearer.token.endpoint.url
orsasl.oauthbearer.jwks.endpoint.url
could enable arbitrary file read via error logs and server-side request forgery. -
Security Fix for CVE-2025-27818 – Deserialization of untrusted data via SASL JAAS login modules in Apache Kafka/Connect: Resolved CVE-2025-27818, a high-severity issue in
org.apache.kafka:kafka
where an authenticated operator could setsasl.jaas.config
tocom.sun.security.auth.module.LdapLoginModule
, triggering LDAP-based deserialization that may enable Remote Code Execution. -
Security Fix for CVE-2025-46701 – Security constraint bypass via CGI servlet pathInfo case handling in Apache Tomcat: Resolved CVE-2025-46701, a low-severity issue where improper case-sensitivity handling in the CGI servlet could allow bypass of security constraints applied to the pathInfo component.
-
Security Fix for CVE-2025-48988 – Denial of service via multipart upload in Apache Tomcat: Resolved CVE-2025-48988, a high-severity issue where unrestricted resource allocation during multipart upload handling could enable a denial of service.
-
Security Fix for CVE-2025-49124 – Untrusted search path in Apache Tomcat Windows installer: Resolved CVE-2025-49124, a high-severity issue where the Windows installer invoked
icacls.exe
without a fully qualified path, enabling potential DLL or binary hijacking during installation. -
Security Fix for PRISMA-2023-0067 – Denial of service via uncontrolled resource consumption in Jackson: Resolved PRISMA-2023-0067, a high-severity issue where
com.fasterxml.jackson.core:jackson-core
did not properly restrict resource usage, enabling potential DoS through uncontrolled resource consumption.
Fixes
-
Fixed handling of expired entries when depopulating global indexes: Resolved an issue where expired entries were skipped during the cleanup of global indexes on migration source nodes. This caused query threads to encounter dangling pointers in the index, leading to JVM crashes. The fix ensures that expired entries are included when depopulating global indexes, preventing such crashes and improving system stability.
-
Fixed Kafka Connector Compatibility: Resolved an issue where some connectors were incompatible with Kafka Connect Runtime > 3.9.0 due to missing
kafka-clients
utilities. This caused connector failures during runtime. The fix ensures that thekafka-clients
dependency is included, restoring compatibility for affected connectors.