Описание
A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
logback | fixed | 1:1.2.11-5 | package | |
logback | no-dsa | bookworm | package | |
logback | no-dsa | bullseye | package | |
logback | postponed | buster | package |
Примечания
https://logback.qos.ch/news.html#1.3.12
Fixed by: https://github.com/qos-ch/logback/commit/b8eac23a9de9e05fb6d51160b3f46acd91af9731 (v_1.3.12)
Fixed by: https://github.com/qos-ch/logback/commit/bb095154be011267b64e37a1d401546e7cc2b7c3 (v_1.2.13)
Only exploitable if logback receiver component is deployed:
https://logback.qos.ch/manual/receivers.html
When fixing the issue make sure to to not introduce CVE-2023-6481 which is
assigned for an incomplete fix for CVE-2023-6378.
Связанные уязвимости
A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Уязвимость компонента logback receiver библиотеки логирования logback, позволяющая нарушителю вызвать отказ в обслуживании