[ 
https://issues.apache.org/jira/browse/BEAM-13434?focusedWorklogId=695490&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-695490
 ]

ASF GitHub Bot logged work on BEAM-13434:
-----------------------------------------

                Author: ASF GitHub Bot
            Created on: 14/Dec/21 03:26
            Start Date: 14/Dec/21 03:26
    Worklog Time Spent: 10m 
      Work Description: dzou edited a comment on pull request #16224:
URL: https://github.com/apache/beam/pull/16224#issuecomment-993122592


   Hey, can we hold on before merging this PR in? The version 1.4.5 of 
pubsublite is not compatible with the dependencies set in the LTS Bom. We need 
to discuss this some more.
   
   @suztomo -- Version 2.35.0 of Beam is going to be used in the January LTS 
release, but version 1.4.5 of pubsublite is not compatible with the versions of 
dependencies we selected in the LTS bom.
   
   We are having some discussions, but we believe that the current version of 
pubsublite does not pull in log4j.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: github-unsubscr...@beam.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Issue Time Tracking
-------------------

    Worklog Id:     (was: 695490)
    Time Spent: 9h 10m  (was: 9h)

> Bump up Apache log4j2 to 2.15.0 due to the vulnerability
> --------------------------------------------------------
>
>                 Key: BEAM-13434
>                 URL: https://issues.apache.org/jira/browse/BEAM-13434
>             Project: Beam
>          Issue Type: Improvement
>          Components: sdk-java-core
>    Affects Versions: 2.34.0
>            Reporter: Yu Ishikawa
>            Priority: P1
>             Fix For: 2.35.0
>
>          Time Spent: 9h 10m
>  Remaining Estimate: 0h
>
> # 
>  ## Overview
> 2.0 <= Apache log4j2 <= 2.14.1 has vulnerability.
>  
> >  In most cases, developers may write error messages caused by user input 
> > into the log. Attackers can use this feature to construct special data 
> > request packets through this vulnerability, and ultimately trigger remote 
> > code execution.
>  
> [UPDATED]
> The vulnerability is labeled to `CVE-2021-44228`.
>  * [https://nvd.nist.gov/vuln/detail/CVE-2021-44228]
>  
> ## References
>  * 
> [https://www.cyberkendra.com/2021/12/worst-log4j-rce-zeroday-dropped-on.html]
>  * 
> [https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/]



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to