This is an automated email from the ASF dual-hosted git repository.

pkarwasz pushed a commit to branch cyclonedx
in repository https://gitbox.apache.org/repos/asf/logging-site.git


The following commit(s) were added to refs/heads/cyclonedx by this push:
     new e9ccda8c Proofread CVE fix versions in `vdr.xml` (#7)
e9ccda8c is described below

commit e9ccda8ca67440d3bfb7d3c37c240522e084eaf7
Author: Piotr P. Karwasz <[email protected]>
AuthorDate: Fri Aug 22 08:07:18 2025 +0200

    Proofread CVE fix versions in `vdr.xml` (#7)
    
    * feat: proofread CVE fix versions in `vdr.xml`
    
    - Updated `vdr.xml` to align with the proofread versioning details
      from PR #7.
    - Introduced a `<metadata>` element to record contact information
      for the Apache Logging Services PMC and Security Team, as well as
      the timestamp of the last modification.
    - Refreshed the `<updated>` timestamps in all modified `<vulnerability>` 
entries.
    - Added inline comment with instructions on how to properly
      update and maintain the VDR file.
    
    * fix: restore original update date for CVE-2021-45105
    
    * fix: update contact information
    
    Update the contact information based on review feedback.
---
 vdr.xml | 58 +++++++++++++++++++++++++++++++++++++---------------------
 1 file changed, 37 insertions(+), 21 deletions(-)

diff --git a/vdr.xml b/vdr.xml
index 98807dca..110dc499 100644
--- a/vdr.xml
+++ b/vdr.xml
@@ -15,7 +15,6 @@
   ~ See the License for the specific language governing permissions and
   ~ limitations under the License.
   -->
-
 <!-- This file is a Vulnerability Disclosure Report (VDR) covering all Apache 
Logging Services[1] projects.
      This file adheres to the CycloneDX SBOM specification[2].
 
@@ -23,21 +22,35 @@
 
      All Apache Logging Services projects (e.g., Log4j) generate SBOMs 
containing `vulnerability-assertion` entries with links to this file.
 
-     If you need help on addressing these vulnerabilities, 
suggestions/corrections on the content, and/or reporting new vulnerabilities, 
please refer to the Log4j support page[3].
+     If you need help in addressing these vulnerabilities, 
suggestions/corrections on the content, and/or reporting new vulnerabilities, 
please refer to the Log4j support page[3].
 
      This file is maintained in version control[4].
 
+     To update the VDR:
+     1. Increment the `version` attribute in the `<bom>` element.
+     2. Update the `<timestamp>` element in the `<metadata>` section
+        to the current UTC date and time.
+     3. For each modified `<vulnerability>`, update its `<updated>` element.
+
      [1] https://logging.apache.org
      [2] https://cyclonedx.org
      [3] https://logging.apache.org/log4j/2.x/support.html
      [4] https://github.com/apache/logging-site/tree/cyclonedx
      -->
 <bom xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
-     xmlns="http://cyclonedx.org/schema/bom/1.5";
-     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.5 
https://cyclonedx.org/schema/bom-1.5.xsd";
-     version="2"
+     xmlns="http://cyclonedx.org/schema/bom/1.6";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.6 
https://cyclonedx.org/schema/bom-1.6.xsd";
+     version="3"
      serialNumber="urn:uuid:dfa35519-9734-4259-bba1-3e825cf4be06">
 
+  <metadata>
+    <timestamp>2025-08-17T11:18:06Z</timestamp>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+
   <!-- We add *dummy* components to refer to in `affects` blocks.
        This is necessary, since not all Log4j components have SBOMs associated 
with them. -->
   <components>
@@ -76,24 +89,24 @@
       </cwes>
       <description><![CDATA[An attacker with write access to the logging 
configuration can construct a malicious configuration using a JDBC Appender 
with a data source referencing a JNDI URI which can execute remote code.
 This issue is fixed by limiting JNDI data source names to the `java` 
protocol.]]></description>
-      <recommendation><![CDATA[Upgrade to `2.3.2` (for Java 6), `2.12.4` (for 
Java 7), or `2.17.1` (for Java 8 and later).
+      <recommendation><![CDATA[Upgrade to `2.3.1` (for Java 6), `2.12.3` (for 
Java 7), or `2.17.0` (for Java 8 and later).
 
 In prior releases confirm that if the JDBC Appender is being used it is not 
configured to use any protocol other than `java`.]]></recommendation>
       <created>2021-12-28T00:00:00Z</created>
       <published>2021-12-28T00:00:00Z</published>
-      <updated>2022-08-08T00:00:00Z</updated>
+      <updated>2025-08-17T11:18:06Z</updated>
       <affects>
         <target>
           <ref>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</ref>
           <versions>
             <version>
-              <range><![CDATA[vers:maven/>=2.0-beta7|<2.3.2]]></range>
+              <range><![CDATA[vers:maven/>=2.0-beta7|<2.3.1]]></range>
             </version>
             <version>
-              <range><![CDATA[vers:maven/>=2.4|<2.12.4]]></range>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
             </version>
             <version>
-              <range><![CDATA[vers:maven/>=2.13.0|<2.17.1]]></range>
+              <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range>
             </version>
           </versions>
         </target>
@@ -210,10 +223,10 @@ Remote code execution has been demonstrated on macOS, 
Fedora, Arch Linux, and Al
 
 Note that this vulnerability is not limited to just the JNDI lookup.
 Any other Lookup could also be included in a Thread Context Map variable and 
possibly have private details exposed to anyone with access to the 
logs.]]></description>
-      <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` 
(for Java 7), or `2.17.0` (for Java 8 and later).]]></recommendation>
+      <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` 
(for Java 7), or `2.16.0` (for Java 8 and later).]]></recommendation>
       <created>2021-12-14T00:00:00Z</created>
       <published>2021-12-14T00:00:00Z</published>
-      <updated>2023-10-26T00:00:00Z</updated>
+      <updated>2025-08-17T11:18:06Z</updated>
       <credits>
         <individuals>
           <individual>
@@ -250,7 +263,7 @@ Any other Lookup could also be included in a Thread Context 
Map variable and pos
               <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
             </version>
             <version>
-              <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range>
+              <range><![CDATA[vers:maven/>=2.13.0|<2.16.0]]></range>
             </version>
           </versions>
         </target>
@@ -299,10 +312,10 @@ Any other Lookup could also be included in a Thread 
Context Map variable and pos
       </cwes>
       <description><![CDATA[In Log4j, the JNDI features used in 
configurations, log messages, and parameters do not protect against 
attacker-controlled LDAP and other JNDI related endpoints.
 An attacker who can control log messages or log message parameters can execute 
arbitrary code loaded from LDAP servers.]]></description>
-      <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` 
(for Java 7), or `2.17.0` (for Java 8 and later).]]></recommendation>
+      <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.2` 
(for Java 7), or `2.15.0` (for Java 8 and later).]]></recommendation>
       <created>2021-12-10T00:00:00Z</created>
       <published>2021-12-10T00:00:00Z</published>
-      <updated>2023-04-03T00:00:00Z</updated>
+      <updated>2025-08-17T11:18:06Z</updated>
       <credits>
         <individuals>
           <individual>
@@ -318,10 +331,10 @@ An attacker who can control log messages or log message 
parameters can execute a
               <range><![CDATA[vers:maven/>=2.0-beta9|<2.3.1]]></range>
             </version>
             <version>
-              <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.2]]></range>
             </version>
             <version>
-              <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range>
+              <range><![CDATA[vers:maven/>=2.13.0|<2.15.0]]></range>
             </version>
           </versions>
         </target>
@@ -366,12 +379,12 @@ The reported issue was caused by an error in 
`SslConfiguration`.
 Any element using `SslConfiguration` in the Log4j `Configuration` is also 
affected by this issue.
 This includes `HttpAppender`, `SocketAppender`, and `SyslogAppender`.
 Usages of `SslConfiguration` that are configured via system properties are not 
affected.]]></description>
-      <recommendation><![CDATA[Upgrade to `2.12.3` (Java 7) or `2.13.2` (Java 
8 and later).
+      <recommendation><![CDATA[Upgrade to `2.3.2` (Java 6), `2.12.3` (Java 7) 
or `2.13.2` (Java 8 and later).
 
 Alternatively, users can set the `mail.smtp.ssl.checkserveridentity` system 
property to `true` to enable SMTPS hostname verification for all SMTPS mail 
sessions.]]></recommendation>
       <created>2017-04-27T00:00:00Z</created>
       <published>2017-04-27T00:00:00Z</published>
-      <updated>2022-05-12T00:00:00Z</updated>
+      <updated>2025-08-17T11:18:06Z</updated>
       <credits>
         <individuals>
           <individual>
@@ -384,10 +397,13 @@ Alternatively, users can set the 
`mail.smtp.ssl.checkserveridentity` system prop
           <ref>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</ref>
           <versions>
             <version>
-              <range><![CDATA[vers:maven/>=2.0-beta1|<2.12.3]]></range>
+              <range><![CDATA[vers:maven/>=2.0-beta1|<2.3.2]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
             </version>
             <version>
-              <version><![CDATA[vers:maven/2.13.1]]></version>
+              <version><![CDATA[vers:maven/>=2.13.0|<2.13.2]]></version>
             </version>
           </versions>
         </target>

Reply via email to