You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "ASF subversion and git services (Jira)" <ji...@apache.org> on 2023/12/05 08:05:00 UTC

[jira] [Commented] (NIFI-12462) Upgrade Logback to 1.3.14

    [ https://issues.apache.org/jira/browse/NIFI-12462?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17793178#comment-17793178 ] 

ASF subversion and git services commented on NIFI-12462:
--------------------------------------------------------

Commit 8dc09c8911685ee8b5d2235ba4cd2c552bd7c4ab in nifi's branch refs/heads/main from David Handermann
[ https://gitbox.apache.org/repos/asf?p=nifi.git;h=8dc09c8911 ]

NIFI-12462 Upgraded Logback from 1.3.13 to 1.3.14

Signed-off-by: Pierre Villard <pi...@gmail.com>

This closes #8114.


> Upgrade Logback to 1.3.14
> -------------------------
>
>                 Key: NIFI-12462
>                 URL: https://issues.apache.org/jira/browse/NIFI-12462
>             Project: Apache NiFi
>          Issue Type: Improvement
>          Components: Core Framework
>            Reporter: David Handermann
>            Assignee: David Handermann
>            Priority: Major
>              Labels: backport-needed
>             Fix For: 1.25.0, 2.0.0
>
>          Time Spent: 10m
>  Remaining Estimate: 0h
>
> Logback 1.3.13 resolved a potential denial of service attack for custom socket-based Logback appenders, which are not used in any default NiFi component configurations. The vulnerability was published as CVE-2023-6378.
> Logback 1.3.14 includes additional improvements to the resolution, so Logback published the same vulnerability as CVE-2023-648, marking version 1.3.13 as vulnerable to encourage users to upgrade to the latest version.
> Although current NiFi versions do not use socket-based Logback appenders, Logback should be upgraded to the latest version on current and support branches.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)