Name | CVE-2023-6378 |
Description | A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1057423 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
logback (PTS) | bullseye | 1:1.2.3-6 | vulnerable |
| bookworm | 1:1.2.11-3 | vulnerable |
| sid, trixie | 1:1.2.11-5 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
logback | source | (unstable) | 1:1.2.11-5 | | | 1057423 |
Notes
[bookworm] - logback <no-dsa> (Minor issue)
[bullseye] - logback <no-dsa> (Minor issue)
[buster] - logback <postponed> (Minor issue, DoS)
https://logback.qos.ch/news.html#1.3.12
Fixed by: https://github.com/qos-ch/logback/commit/b8eac23a9de9e05fb6d51160b3f46acd91af9731 (v_1.3.12)
Fixed by: https://github.com/qos-ch/logback/commit/bb095154be011267b64e37a1d401546e7cc2b7c3 (v_1.2.13)
Only exploitable if logback receiver component is deployed:
https://logback.qos.ch/manual/receivers.html
When fixing the issue make sure to to not introduce CVE-2023-6481 which is
assigned for an incomplete fix for CVE-2023-6378.