On 11/28/2023 4:07 PM, Michael Jumper wrote:
Hello all,

The first release candidate for Apache Guacamole 1.5.4 has been uploaded and is ready for VOTE. The draft release notes (along with links to artifacts, signatures/checksums, and updated documentation) can be found here:

http://guacamole.apache.org/releases/1.5.4/

The git tag for all relevant repositories is "1.5.4-RC1":

https://github.com/apache/guacamole-client/tree/1.5.4-RC1
https://github.com/apache/guacamole-server/tree/1.5.4-RC1
https://github.com/apache/guacamole-manual/tree/1.5.4-RC1

Build instructions are included in the manual, which is part of the updated documentation referenced above. For convenience:

http://guacamole.apache.org/doc/1.5.4/gug/installing-guacamole.html

Maven artifacts for guacamole-common, guacamole-common-js, and guacamole-ext can be found in the following staging repository:

https://repository.apache.org/content/repositories/orgapacheguacamole-1021

Source and binary distributions (also linked within the release notes):

https://dist.apache.org/repos/dist/dev/guacamole/1.5.4-RC1/

Artifacts have been signed with the "[email protected]" key listed in:

https://dist.apache.org/repos/dist/dev/guacamole/KEYS

Please review and vote:

[ ] +1 Approve the release
[ ] -1 Don't approve the release (please provide specific comments)

This vote will be open for at least 72 hours.


Cancelling this in favor of an RC2 as Logback has since issued a 1.3.12 update correcting a bug with an associated CVE [1]. They've since issued further updates, with the latest compatible version being 1.3.14 as of today [2].

It doesn't look like the CVE would affect users of Guacamole at all, as it depends on Logback having been manually reconfigured use a "receiver", but it's certainly worth an RC2.

- Mike

[1] https://nvd.nist.gov/vuln/detail/CVE-2023-6378
[2] https://logback.qos.ch/news.html#1.3.14

Reply via email to