Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1432858 - (CVE-2017-5929) CVE-2017-5929 logback: Serialization vulnerability in SocketServer and ServerSocketReceiver
CVE-2017-5929 logback: Serialization vulnerability in SocketServer and Server...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170208,repor...
: Security
Depends On: 1471347
Blocks: 1432861 1460775
  Show dependency treegraph
 
Reported: 2017-03-16 05:18 EDT by Andrej Nemec
Modified: 2018-10-16 11:19 EDT (History)
26 users (show)

See Also:
Fixed In Version: logback-classic 1.2.0
Doc Type: Bug Fix
Doc Text:
It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1675 normal SHIPPED_LIVE Moderate: Red Hat JBoss BPM Suite security update 2017-07-04 18:00:22 EDT
Red Hat Product Errata RHSA-2017:1676 normal SHIPPED_LIVE Moderate: Red Hat JBoss BRMS security update 2017-07-04 18:00:02 EDT
Red Hat Product Errata RHSA-2017:1832 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse/A-MQ 6.3 R4 security and bug fix update 2017-08-15 01:47:49 EDT
Red Hat Product Errata RHSA-2018:2927 None None None 2018-10-16 11:19 EDT

  None (edit)
Description Andrej Nemec 2017-03-16 05:18:19 EDT
It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains. 

References:

https://logback.qos.ch/news.html
Comment 4 Pavel Polischouk 2017-04-19 11:01:02 EDT
Upstream commit: 

https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8
Comment 5 errata-xmlrpc 2017-07-04 14:01:34 EDT
This issue has been addressed in the following products:

  Red Hat JBoss BRMS

Via RHSA-2017:1676 https://access.redhat.com/errata/RHSA-2017:1676
Comment 6 errata-xmlrpc 2017-07-04 14:02:40 EDT
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite

Via RHSA-2017:1675 https://access.redhat.com/errata/RHSA-2017:1675
Comment 8 errata-xmlrpc 2017-08-10 19:04:07 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse

Via RHSA-2017:1832 https://access.redhat.com/errata/RHSA-2017:1832
Comment 10 errata-xmlrpc 2018-10-16 11:19:00 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 6.4 for RHEL 7

Via RHSA-2018:2927 https://access.redhat.com/errata/RHSA-2018:2927

Note You need to log in before you can comment on or make changes to this bug.