You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "ASF subversion and git services (Jira)" <ji...@apache.org> on 2023/12/05 08:05:00 UTC
[jira] [Commented] (NIFI-12462) Upgrade Logback to 1.3.14
[ https://issues.apache.org/jira/browse/NIFI-12462?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17793178#comment-17793178 ]
ASF subversion and git services commented on NIFI-12462:
--------------------------------------------------------
Commit 8dc09c8911685ee8b5d2235ba4cd2c552bd7c4ab in nifi's branch refs/heads/main from David Handermann
[ https://gitbox.apache.org/repos/asf?p=nifi.git;h=8dc09c8911 ]
NIFI-12462 Upgraded Logback from 1.3.13 to 1.3.14
Signed-off-by: Pierre Villard <pi...@gmail.com>
This closes #8114.
> Upgrade Logback to 1.3.14
> -------------------------
>
> Key: NIFI-12462
> URL: https://issues.apache.org/jira/browse/NIFI-12462
> Project: Apache NiFi
> Issue Type: Improvement
> Components: Core Framework
> Reporter: David Handermann
> Assignee: David Handermann
> Priority: Major
> Labels: backport-needed
> Fix For: 1.25.0, 2.0.0
>
> Time Spent: 10m
> Remaining Estimate: 0h
>
> Logback 1.3.13 resolved a potential denial of service attack for custom socket-based Logback appenders, which are not used in any default NiFi component configurations. The vulnerability was published as CVE-2023-6378.
> Logback 1.3.14 includes additional improvements to the resolution, so Logback published the same vulnerability as CVE-2023-648, marking version 1.3.13 as vulnerable to encourage users to upgrade to the latest version.
> Although current NiFi versions do not use socket-based Logback appenders, Logback should be upgraded to the latest version on current and support branches.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)