openSUSE Security Update: Security update for logback ______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1613-1 Rating: important References: #1193795 Cross-References: CVE-2021-44228 CVSS scores: CVE-2021-44228 (NVD) : 10 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVE-2021-44228 (SUSE): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________
An update that fixes one vulnerability is now available.
This update for logback fixes the following issues:
Upgrade to version 1.2.8
+ In response to log4Shell/CVE-2021-44228, all JNDI lookup code in logback has been disabled until further notice. This impacts ContextJNDISelector and insertFromJNDI element in configuration files. + Also in response to log4Shell/CVE-2021-44228, all database (JDBC) related code in the project has been removed with no replacement. + Note that the vulnerability mentioned in LOGBACK-1591 requires write access to logback's configuration file as a prerequisite. The log4Shell/CVE-2021-44228 and LOGBACK-1591 are of different severity levels. A successful RCE requires all of the following conditions to be met: - write access to logback.xml - use of versions lower then 1.2.8 - reloading of poisoned configuration data, which implies application restart or scan="true" set prior to attack
This update was imported from the SUSE:SLE-15-SP2:Update update project.
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1613=1
- openSUSE Leap 15.2 (noarch):
logback-1.2.8-lp184.108.40.206 logback-access-1.2.8-lp220.127.116.11 logback-examples-1.2.8-lp18.104.22.168 logback-javadoc-1.2.8-lp22.214.171.124