This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/logging-site.git
The following commit(s) were added to refs/heads/asf-staging by this push: new a4304067 Automatic Site Publish by Buildbot a4304067 is described below commit a430406769fca32dd139e52bfb136ae17d394643 Author: buildbot <us...@infra.apache.org> AuthorDate: Sun Aug 17 11:05:14 2025 +0000 Automatic Site Publish by Buildbot --- content/feed.xml | 2 +- content/security.html | 32 +++++++++++++++++++------------- 2 files changed, 20 insertions(+), 14 deletions(-) diff --git a/content/feed.xml b/content/feed.xml index 1e8eefa0..b16e80bc 100644 --- a/content/feed.xml +++ b/content/feed.xml @@ -1,4 +1,4 @@ -<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="/feed.xml" rel="self" type="application/atom+xml" /><link href="/" rel="alternate" type="text/html" /><updated>2025-08-15T14:47:05+00:00</updated><id>/feed.xml</id><title type="html">Apache Software Foundation - Logging Services</title><subtitle>Write an awesome description for your new site here. You can edit this line in _ [...] +<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="/feed.xml" rel="self" type="application/atom+xml" /><link href="/" rel="alternate" type="text/html" /><updated>2025-08-17T11:05:13+00:00</updated><id>/feed.xml</id><title type="html">Apache Software Foundation - Logging Services</title><subtitle>Write an awesome description for your new site here. You can edit this line in _ [...] <p>A <strong>Vulnerability Exploitability eXchange (VEX)</strong> is a machine-readable file used to indicate whether vulnerabilities in an application’s third-party dependencies are actually exploitable.</p> diff --git a/content/security.html b/content/security.html index e8c3ef9b..af4eabe4 100644 --- a/content/security.html +++ b/content/security.html @@ -458,11 +458,11 @@ We only extend this mathematical notation with set union operator (i.e., <code> </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions affected</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta7, 2.3.2) ∪ [2.4, 2.12.4) ∪ [2.13.0, 2.17.1)</code></p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta7, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)</code></p></td> </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions fixed</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.3.2</code> (for Java 6), <code>2.12.4</code> (for Java 7), or <code>2.17.1</code> (for Java 8 and later)</p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), or <code>2.17.0</code> (for Java 8 and later)</p></td> </tr> </tbody> </table> @@ -476,7 +476,7 @@ This issue is fixed by limiting JNDI data source names to the <code>java</code> <div class="sect3"> <h4 id="CVE-2021-44832-mitigation">Mitigation</h4> <div class="paragraph"> -<p>Upgrade to <code>2.3.2</code> (for Java 6), <code>2.12.4</code> (for Java 7), or <code>2.17.1</code> (for Java 8 and later).</p> +<p>Upgrade to <code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), or <code>2.17.0</code> (for Java 8 and later).</p> </div> <div class="paragraph"> <p>In prior releases confirm that if the JDBC Appender is being used it is not configured to use any protocol other than <code>java</code>.</p> @@ -489,6 +489,9 @@ This issue is fixed by limiting JNDI data source names to the <code>java</code> <li> <p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832">CVE-2021-44832</a></p> </li> +<li> +<p><a href="https://issues.apache.org/jira/browse/LOG4J2-3242">LOG4J2-3242</a></p> +</li> </ul> </div> </div> @@ -598,11 +601,11 @@ Applications using only the <code>log4j-api</code> JAR file without the <code>lo </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions affected</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)</code></p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.16.0)</code></p></td> </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions fixed</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), and <code>2.17.0</code> (for Java 8 and later)</p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), and <code>2.16.0</code> (for Java 8 and later)</p></td> </tr> </tbody> </table> @@ -625,7 +628,7 @@ Applications using only the <code>log4j-api</code> JAR file without the <code>lo <div class="sect3"> <h4 id="CVE-2021-45046-mitigation">Mitigation</h4> <div class="paragraph"> -<p>Upgrade to Log4j <code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), or <code>2.17.0</code> (for Java 8 and later).</p> +<p>Upgrade to Log4j <code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), or <code>2.16.0</code> (for Java 8 and later).</p> </div> </div> <div class="sect3"> @@ -673,11 +676,11 @@ Applications using only the <code>log4j-api</code> JAR file without the <code>lo </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions affected</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)</code></p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.2) ∪ [2.13.0, 2.15.0)</code></p></td> </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions fixed</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), and <code>2.17.0</code> (for Java 8 and later)</p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.3.1</code> (for Java 6), <code>2.12.2</code> (for Java 7), and <code>2.15.0</code> (for Java 8 and later)</p></td> </tr> </tbody> </table> @@ -723,7 +726,7 @@ Log4j 1 configurations without <code>JMSAppender</code> are not impacted by this <div class="sect4"> <h5 id="CVE-2021-44228-mitigation-log4j2">Log4j 2 mitigation</h5> <div class="paragraph"> -<p>Upgrade to Log4j <code>2.3.1</code> (for Java 6), <code>2.12.3</code> (for Java 7), or <code>2.17.0</code> (for Java 8 and later).</p> +<p>Upgrade to Log4j <code>2.3.1</code> (for Java 6), <code>2.12.2</code> (for Java 7), or <code>2.15.0</code> (for Java 8 and later).</p> </div> </div> </div> @@ -746,6 +749,9 @@ Log4j 1 configurations without <code>JMSAppender</code> are not impacted by this <li> <p><a href="https://issues.apache.org/jira/browse/LOG4J2-3201">LOG4J2-3201</a></p> </li> +<li> +<p><a href="https://issues.apache.org/jira/browse/LOG4J2-3242">LOG4J2-3242</a></p> +</li> </ul> </div> </div> @@ -772,11 +778,11 @@ Log4j 1 configurations without <code>JMSAppender</code> are not impacted by this </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions affected</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta1, 2.12.3) ∪ [2.13.1, 2.13.2)</code></p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>[2.0-beta1, 2.3.2) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.13.2)</code></p></td> </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions fixed</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.12.3</code> (Java 7) and <code>2.13.2</code> (Java 8 and later)</p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.3.2</code> (for Java 6), <code>2.12.3</code> (for Java 7) and <code>2.13.2</code> (for Java 8 and later)</p></td> </tr> </tbody> </table> @@ -797,7 +803,7 @@ Usages of <code>SslConfiguration</code> that are configured via system propertie <div class="sect3"> <h4 id="CVE-2020-9488-mitigation">Mitigation</h4> <div class="paragraph"> -<p>Upgrade to <code>2.12.3</code> (Java 7) or <code>2.13.2</code> (Java 8 and later).</p> +<p>Upgrade to <code>2.3.2</code> (Java 6), <code>2.12.3</code> (Java 7) or <code>2.13.2</code> (Java 8 and later).</p> </div> <div class="paragraph"> <p>Alternatively, users can set the <code>mail.smtp.ssl.checkserveridentity</code> system property to <code>true</code> to enable SMTPS hostname verification for all SMTPS mail sessions.</p> @@ -849,7 +855,7 @@ Usages of <code>SslConfiguration</code> that are configured via system propertie </tr> <tr> <th class="tableblock halign-left valign-top"><p class="tableblock">Versions fixed</p></th> -<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.8.2</code> (Java 7)</p></td> +<td class="tableblock halign-left valign-top"><p class="tableblock"><code>2.8.2</code> (for Java 7 and later)</p></td> </tr> </tbody> </table>