[ https://issues.apache.org/jira/browse/BEAM-13434?focusedWorklogId=695411&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-695411 ]
ASF GitHub Bot logged work on BEAM-13434: ----------------------------------------- Author: ASF GitHub Bot Created on: 13/Dec/21 23:07 Start Date: 13/Dec/21 23:07 Worklog Time Spent: 10m Work Description: iemejia commented on a change in pull request #16191: URL: https://github.com/apache/beam/pull/16191#discussion_r768191685 ########## File path: sdks/java/io/hcatalog/build.gradle ########## @@ -43,7 +43,7 @@ test { configurations.testRuntimeClasspath { resolutionStrategy { - def log4j_version = "2.8.2" + def log4j_version = "2.15.0" Review comment: If we want to force the same version everywhere maybe it is better to remove the full ` configurations.testRuntimeClasspath` block (to avoid versions divergence in the future). I had to explicitly pin an older version to avoid issues with the HCatalog tests if I remember correctly. If the full build passes with the updated version I suppose it should be ok to go since log4j is mostly a transitive/runtime dependency. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: github-unsubscr...@beam.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org Issue Time Tracking ------------------- Worklog Id: (was: 695411) Time Spent: 5h 20m (was: 5h 10m) > Bump up Apache log4j2 to 2.15.0 due to the vulnerability > -------------------------------------------------------- > > Key: BEAM-13434 > URL: https://issues.apache.org/jira/browse/BEAM-13434 > Project: Beam > Issue Type: Improvement > Components: sdk-java-core > Affects Versions: 2.34.0 > Reporter: Yu Ishikawa > Priority: P1 > Fix For: 2.36.0 > > Time Spent: 5h 20m > Remaining Estimate: 0h > > # > ## Overview > 2.0 <= Apache log4j2 <= 2.14.1 has vulnerability. > > > In most cases, developers may write error messages caused by user input > > into the log. Attackers can use this feature to construct special data > > request packets through this vulnerability, and ultimately trigger remote > > code execution. > > [UPDATED] > The vulnerability is labeled to `CVE-2021-44228`. > * [https://nvd.nist.gov/vuln/detail/CVE-2021-44228] > > ## References > * > [https://www.cyberkendra.com/2021/12/worst-log4j-rce-zeroday-dropped-on.html] > * > [https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/] -- This message was sent by Atlassian Jira (v8.20.1#820001)