You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@flink.apache.org by "Abdelrahman (Jira)" <ji...@apache.org> on 2021/12/20 16:06:00 UTC

[jira] [Created] (FLINK-25394) [Flink-ML] Upgrade log4j to 2.17.0 to address CVE-2021-45105

Abdelrahman created FLINK-25394:
-----------------------------------

             Summary: [Flink-ML] Upgrade log4j to 2.17.0 to address CVE-2021-45105
                 Key: FLINK-25394
                 URL: https://issues.apache.org/jira/browse/FLINK-25394
             Project: Flink
          Issue Type: Improvement
    Affects Versions: 1.14.2
            Reporter: Abdelrahman


Apache Log4j2 versions 2.0-alpha1 through 2.16.0 did not protect from uncontrolled recursion from self-referential lookups. When the logging configuration uses a non-default Pattern Layout with a Context Lookup (for example, $${ctx:loginId}), attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup, resulting in a StackOverflowError that will terminate the process. This is also known as a DOS (Denial of Service) attack.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)