raboof commented on code in PR #6:
URL: https://github.com/apache/logging-site/pull/6#discussion_r1995312754


##########
_vulnerabilities.adoc:
##########
@@ -106,8 +107,8 @@ Independently discovered by Hideki Okamoto of Akamai 
Technologies, Guy Lederfein
 |Summary |Thread Context Lookup is vulnerable to remote code execution in 
certain configurations
 |CVSS 3.x Score & Vector |9.0 CRITICAL 
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
 |Components affected |`log4j-core`
-|Versions affected |`[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)`
-|Versions fixed |`2.3.1` (for Java 6), `2.12.3` (for Java 7), and `2.17.0` 
(for Java 8 and later)
+|Versions affected |`[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.16.0)`

Review Comment:
   I was not around when log4shell happened so take my input with a grain of 
salt, but my understanding so far is:
   
   From a purely practical perspective, without looking at the technical side 
at all, the details of the the version metadata we have published to Mitre for 
CVE-2021-45046 (https://www.cve.org/CVERecord?id=CVE-2021-45046) is that only 
versions before 1.16.0 were affected.
   
   While I agree with erring on the safe side, as we cannot widen affected 
version ranges on already-published CVEs, the low-friction way to make things 
consistent might be to have CVE-2021-45046 listed as affecting versions before 
1.16.0, but add references  highlighting that operators should also consider 
the follow-ups CVE-2021-45105 and CVE-2021-44832 and make sure to upgrade to 
1.17.1 (1.17.0?).



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@logging.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to