CVE-2023-6378

NameCVE-2023-6378
DescriptionA serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1057423

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
logback (PTS)bullseye1:1.2.3-6vulnerable
bookworm1:1.2.11-3vulnerable
sid, trixie1:1.2.11-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
logbacksource(unstable)1:1.2.11-51057423

Notes

[bookworm] - logback <no-dsa> (Minor issue)
[bullseye] - logback <no-dsa> (Minor issue)
[buster] - logback <postponed> (Minor issue, DoS)
https://logback.qos.ch/news.html#1.3.12
Fixed by: https://github.com/qos-ch/logback/commit/b8eac23a9de9e05fb6d51160b3f46acd91af9731 (v_1.3.12)
Fixed by: https://github.com/qos-ch/logback/commit/bb095154be011267b64e37a1d401546e7cc2b7c3 (v_1.2.13)
Only exploitable if logback receiver component is deployed:
https://logback.qos.ch/manual/receivers.html
When fixing the issue make sure to to not introduce CVE-2023-6481 which is
assigned for an incomplete fix for CVE-2023-6378.

Search for package or bug name: Reporting problems