This is an automated email from the ASF dual-hosted git repository.
btellier pushed a commit to branch 3.6.x
in repository https://gitbox.apache.org/repos/asf/james-project.git
The following commit(s) were added to refs/heads/3.6.x by this push:
new 7e2f40a [UPGRADE] Upgrade log4j 2.17.0 -> 2.17.1 (#817)
7e2f40a is described below
commit 7e2f40a7231933feb0d6e18999d7493d12d2fd13
Author: Benoit TELLIER <[email protected]>
AuthorDate: Wed Jan 5 18:11:57 2022 +0700
[UPGRADE] Upgrade log4j 2.17.0 -> 2.17.1 (#817)
Solves CVE-2021-44832 (Score 6.6)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832
Apache Log4j2 versions 2.0-beta7 through 2.17.0
(excluding security fix releases 2.3.2 and 2.12.4)
are vulnerable to a remote code execution (RCE)
attack when a configuration uses a JDBC Appender
with a JNDI LDAP data source URI when an attacker
has control of the target LDAP server. This issue
is fixed by limiting JNDI data source names to the
java protocol in Log4j2 versions 2.17.1, 2.12.4,
and 2.3.2.
---
pom.xml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/pom.xml b/pom.xml
index 47de5e8..a7c502d 100644
--- a/pom.xml
+++ b/pom.xml
@@ -593,7 +593,7 @@
<apache.openjpa.version>3.1.2</apache.openjpa.version>
<camel.version>3.8.0</camel.version>
<derby.version>10.14.2.0</derby.version>
- <log4j2.version>2.17.0</log4j2.version>
+ <log4j2.version>2.17.1</log4j2.version>
<javax.inject.version>1</javax.inject.version>
<javax.activation.groupId>javax.activation</javax.activation.groupId>
<javax.activation.artifactId>activation</javax.activation.artifactId>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]