[ 
https://issues.apache.org/jira/browse/HDDS-6143?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Attila Doroszlai resolved HDDS-6143.
------------------------------------
    Fix Version/s: 1.2.2
       Resolution: Fixed

> Update log4j version to 2.17.1
> ------------------------------
>
>                 Key: HDDS-6143
>                 URL: https://issues.apache.org/jira/browse/HDDS-6143
>             Project: Apache Ozone
>          Issue Type: Bug
>          Components: build
>            Reporter: Siyao Meng
>            Assignee: Siyao Meng
>            Priority: Major
>              Labels: pull-request-available
>             Fix For: 1.3.0, 1.2.2
>
>
> Release notes: 
> https://github.com/apache/logging-log4j2/blob/rel/2.17.1/RELEASE-NOTES.md
> Looks like another RCE 
> ([CVE-2021-44832|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832])
>  in 2.17.0.
> {code}
> Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix 
> releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) 
> attack where an attacker with permission to modify the logging configuration 
> file can construct a malicious configuration using a JDBC Appender with a 
> data source referencing a JNDI URI which can execute remote code. This issue 
> is fixed by limiting JNDI data source names to the java protocol in Log4j2 
> versions 2.17.1, 2.12.4, and 2.3.2.
> {code}
> https://www.bleepingcomputer.com/news/security/log4j-2171-out-now-fixes-new-remote-code-execution-bug/



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to