Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency ch.qos.logback:logback-classic to v1.2.13 [SECURITY] #2

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 5, 2023

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
ch.qos.logback:logback-classic (source, changelog) 1.0.0 -> 1.2.13 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2017-5929

QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.

CVE-2023-6378

A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.

This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/maven-ch.qos.logback-logback-classic-vulnerability branch from 22ee6ef to 1643b6c Compare November 30, 2023 05:58
@renovate renovate bot changed the title Update dependency ch.qos.logback:logback-classic to v1.2.0 [SECURITY] Update dependency ch.qos.logback:logback-classic to v1.3.12 [SECURITY] Nov 30, 2023
@renovate renovate bot force-pushed the renovate/maven-ch.qos.logback-logback-classic-vulnerability branch from 1643b6c to 4abc50a Compare December 6, 2023 17:52
@renovate renovate bot changed the title Update dependency ch.qos.logback:logback-classic to v1.3.12 [SECURITY] Update dependency ch.qos.logback:logback-classic to v1.2.13 [SECURITY] Dec 6, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants