Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency fluentd to v1.15.3 [security] (release-2.9.x) - autoclosed #11992

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 19, 2024

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
fluentd '1.14.2' -> '1.15.3' age adoption passing confidence

fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)

BIT-fluentd-2022-39379 / CVE-2022-39379 / GHSA-fppq-mj76-fpj2

More information

Details

Impact

A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads.

Fluentd setups are only affected if the environment variable FLUENT_OJ_OPTION_MODE is explicitly set to object.

Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability.

Patches

v1.15.3

Workarounds

Do not use FLUENT_OJ_OPTION_MODE=object.

References
  • GHSL-2022-067

Severity

  • CVSS Score: 3.1 / 10 (Low)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner February 19, 2024 19:10
@renovate renovate bot added area/security dependencies Pull requests that update a dependency file labels Feb 19, 2024
@renovate renovate bot changed the title chore(deps): update dependency fluentd to v1.15.3 [security] (release-2.9.x) chore(deps): update dependency fluentd to v1.15.3 [security] (release-2.9.x) - autoclosed Apr 18, 2024
@renovate renovate bot closed this Apr 18, 2024
@renovate renovate bot deleted the deps-update/release-2.9.x-rubygems-fluentd-vulnerability branch April 18, 2024 19:01
@renovate renovate bot changed the title chore(deps): update dependency fluentd to v1.15.3 [security] (release-2.9.x) - autoclosed chore(deps): update dependency fluentd to v1.15.3 [security] (release-2.9.x) Apr 21, 2024
@renovate renovate bot reopened this Apr 21, 2024
@renovate renovate bot restored the deps-update/release-2.9.x-rubygems-fluentd-vulnerability branch April 21, 2024 09:55
@renovate renovate bot force-pushed the deps-update/release-2.9.x-rubygems-fluentd-vulnerability branch from 1e14410 to f724d34 Compare April 21, 2024 09:59
@renovate renovate bot changed the title chore(deps): update dependency fluentd to v1.15.3 [security] (release-2.9.x) chore(deps): update dependency fluentd to v1.15.3 [security] (release-2.9.x) - autoclosed Jul 30, 2024
@renovate renovate bot closed this Jul 30, 2024
@renovate renovate bot deleted the deps-update/release-2.9.x-rubygems-fluentd-vulnerability branch July 30, 2024 02:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security dependencies Pull requests that update a dependency file size/XS
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants