This is an automated email from the ASF dual-hosted git repository.

btellier pushed a commit to branch 3.6.x
in repository https://gitbox.apache.org/repos/asf/james-project.git


The following commit(s) were added to refs/heads/3.6.x by this push:
     new 7e2f40a  [UPGRADE] Upgrade log4j 2.17.0 -> 2.17.1 (#817)
7e2f40a is described below

commit 7e2f40a7231933feb0d6e18999d7493d12d2fd13
Author: Benoit TELLIER <[email protected]>
AuthorDate: Wed Jan 5 18:11:57 2022 +0700

    [UPGRADE] Upgrade log4j 2.17.0 -> 2.17.1 (#817)
    
    Solves CVE-2021-44832 (Score 6.6)
    
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832
    
    Apache Log4j2 versions 2.0-beta7 through 2.17.0
    (excluding security fix releases 2.3.2 and 2.12.4)
    are vulnerable to a remote code execution (RCE)
    attack when a configuration uses a JDBC Appender
    with a JNDI LDAP data source URI when an attacker
    has control of the target LDAP server. This issue
    is fixed by limiting JNDI data source names to the
    java protocol in Log4j2 versions 2.17.1, 2.12.4,
    and 2.3.2.
---
 pom.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/pom.xml b/pom.xml
index 47de5e8..a7c502d 100644
--- a/pom.xml
+++ b/pom.xml
@@ -593,7 +593,7 @@
         <apache.openjpa.version>3.1.2</apache.openjpa.version>
         <camel.version>3.8.0</camel.version>
         <derby.version>10.14.2.0</derby.version>
-        <log4j2.version>2.17.0</log4j2.version>
+        <log4j2.version>2.17.1</log4j2.version>
         <javax.inject.version>1</javax.inject.version>
         <javax.activation.groupId>javax.activation</javax.activation.groupId>
         <javax.activation.artifactId>activation</javax.activation.artifactId>

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to