openSUSE: 2021:1613-1 important: logback

Advisories


   openSUSE Security Update: Security update for logback
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:1613-1
Rating:             important
References:         #1193795 
Cross-References:   CVE-2021-44228
CVSS scores:
                    CVE-2021-44228 (NVD) : 10 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
                    CVE-2021-44228 (SUSE): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for logback fixes the following issues:

   Upgrade to version 1.2.8

   + In response to log4Shell/CVE-2021-44228, all JNDI lookup code in logback
     has been disabled until further notice. This impacts ContextJNDISelector
     and insertFromJNDI element in configuration files.
   + Also in response to log4Shell/CVE-2021-44228, all database (JDBC)
     related code in the project has been removed with no replacement.
   + Note that the vulnerability mentioned in LOGBACK-1591 requires write
     access to logback's configuration file as a prerequisite. The
     log4Shell/CVE-2021-44228 and LOGBACK-1591 are of different severity
     levels. A successful RCE requires all of the following conditions to be
     met:
     - write access to logback.xml
     - use of versions lower then 1.2.8
     - reloading of poisoned configuration data, which implies application
       restart or scan="true" set prior to attack

   This update was imported from the SUSE:SLE-15-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-1613=1



Package List:

   - openSUSE Leap 15.2 (noarch):

      logback-1.2.8-lp152.2.3.2
      logback-access-1.2.8-lp152.2.3.2
      logback-examples-1.2.8-lp152.2.3.2
      logback-javadoc-1.2.8-lp152.2.3.2


References:

   https://www.suse.com/security/cve/CVE-2021-44228.html
   https://bugzilla.suse.com/1193795

openSUSE: 2021:1613-1 important: logback

December 24, 2021
An update that fixes one vulnerability is now available

Description

This update for logback fixes the following issues: Upgrade to version 1.2.8 + In response to log4Shell/CVE-2021-44228, all JNDI lookup code in logback has been disabled until further notice. This impacts ContextJNDISelector and insertFromJNDI element in configuration files. + Also in response to log4Shell/CVE-2021-44228, all database (JDBC) related code in the project has been removed with no replacement. + Note that the vulnerability mentioned in LOGBACK-1591 requires write access to logback's configuration file as a prerequisite. The log4Shell/CVE-2021-44228 and LOGBACK-1591 are of different severity levels. A successful RCE requires all of the following conditions to be met: - write access to logback.xml - use of versions lower then 1.2.8 - reloading of poisoned configuration data, which implies application restart or scan="true" set prior to attack This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch

To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1613=1

Package List

- openSUSE Leap 15.2 (noarch): logback-1.2.8-lp152.2.3.2 logback-access-1.2.8-lp152.2.3.2 logback-examples-1.2.8-lp152.2.3.2 logback-javadoc-1.2.8-lp152.2.3.2

References

https://www.suse.com/security/cve/CVE-2021-44228.html https://bugzilla.suse.com/1193795

Severity
Announcement ID: openSUSE-SU-2021:1613-1
Rating: important
Affected Products: openSUSE Leap 15.2 .

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.