[
https://issues.apache.org/jira/browse/BEAM-13434?focusedWorklogId=696017&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-696017
]
ASF GitHub Bot logged work on BEAM-13434:
-----------------------------------------
Author: ASF GitHub Bot
Created on: 14/Dec/21 18:15
Start Date: 14/Dec/21 18:15
Worklog Time Spent: 10m
Work Description: kennknowles commented on a change in pull request
#16233:
URL: https://github.com/apache/beam/pull/16233#discussion_r768927139
##########
File path:
buildSrc/src/main/groovy/org/apache/beam/gradle/BeamModulePlugin.groovy
##########
@@ -1149,6 +1149,16 @@ class BeamModulePlugin implements Plugin<Project> {
options.errorprone.errorproneArgs.add("-Xep:UnsafeReflectiveConstructionCast:OFF")
}
+ def log4j_version = "2.15.0"
+ configurations.all {
+ resolutionStrategy {
Review comment:
Sorry - this is a test only draft. I don't see a good way for us to
actually commit this change. Perhaps via an example archetype.
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: [email protected]
For queries about this service, please contact Infrastructure at:
[email protected]
Issue Time Tracking
-------------------
Worklog Id: (was: 696017)
Time Spent: 11h 50m (was: 11h 40m)
> Bump up Apache log4j2 to 2.15.0 due to the vulnerability
> --------------------------------------------------------
>
> Key: BEAM-13434
> URL: https://issues.apache.org/jira/browse/BEAM-13434
> Project: Beam
> Issue Type: Improvement
> Components: sdk-java-core
> Affects Versions: 2.34.0
> Reporter: Yu Ishikawa
> Priority: P1
> Fix For: 2.35.0
>
> Time Spent: 11h 50m
> Remaining Estimate: 0h
>
> #
> ## Overview
> 2.0 <= Apache log4j2 <= 2.14.1 has vulnerability.
>
> > In most cases, developers may write error messages caused by user input
> > into the log. Attackers can use this feature to construct special data
> > request packets through this vulnerability, and ultimately trigger remote
> > code execution.
>
> [UPDATED]
> The vulnerability is labeled to `CVE-2021-44228`.
> * [https://nvd.nist.gov/vuln/detail/CVE-2021-44228]
>
> ## References
> *
> [https://www.cyberkendra.com/2021/12/worst-log4j-rce-zeroday-dropped-on.html]
> *
> [https://www.spigotmc.org/threads/spigot-security-releases-%E2%80%94-1-8-8%E2%80%931-18.537204/]
--
This message was sent by Atlassian Jira
(v8.20.1#820001)