Skip to content

Update dependency ch.qos.logback:logback-classic to v1.2.13 [SECURITY]#1048

Open
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/maven-ch.qos.logback-logback-classic-vulnerability
Open

Update dependency ch.qos.logback:logback-classic to v1.2.13 [SECURITY]#1048
renovate[bot] wants to merge 1 commit into
masterfrom
renovate/maven-ch.qos.logback-logback-classic-vulnerability

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate Bot commented May 12, 2026

This PR contains the following updates:

Package Change Age Confidence
ch.qos.logback:logback-classic (source, changelog) 1.1.71.2.13 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


QOS.ch Logback vulnerable to Deserialization of Untrusted Data

CVE-2017-5929 / GHSA-vmfg-rjjm-rjrj

More information

Details

QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.

Severity

  • CVSS Score: 9.8 / 10 (Critical)
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


logback serialization vulnerability

CVE-2023-6378 / GHSA-vmq6-5m68-f53m

More information

Details

A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.

This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html

Severity

  • CVSS Score: 7.1 / 10 (High)
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: (in timezone CET)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot added the security label May 12, 2026
@hashicorp-vault-sonar-prod
Copy link
Copy Markdown

hashicorp-vault-sonar-prod Bot commented May 12, 2026

Renovate Jira issue ID: SLE-1494

@sonar-review-alpha
Copy link
Copy Markdown

sonar-review-alpha Bot commented May 12, 2026

Summary

⚠️ The PR description exceeded the analysis limit and was truncated. The review may not reflect all context.

This PR updates the logback-classic dependency in the test project from 1.1.7 to 1.2.13 to address CVE-2017-5929, a critical deserialization vulnerability in the SocketServer and ServerSocketReceiver components. The change is a single-file update affecting only the integration test project's pom.xml. Version 1.2.13 contains the fix for this vulnerability (introduced in 1.2.0) and is the latest stable release in the 1.2.x series.

What reviewers should know

What to check:

  • Verify the test project still compiles with logback 1.2.13 (no API breaks between 1.1.7 and 1.2.13)
  • This is a maintenance version jump within the same major.minor, so breaking changes are unlikely
  • The change is isolated to test fixtures, not core IDE functionality

No other files affected — this is a straightforward Renovate-generated dependency bump with minimal blast radius.


  • Generate Walkthrough
  • Generate Diagram

🗣️ Give feedback

sonar-review-alpha[bot]

This comment was marked as outdated.

@renovate renovate Bot force-pushed the renovate/maven-ch.qos.logback-logback-classic-vulnerability branch from bed45cd to 50f423c Compare May 15, 2026 14:07
Copy link
Copy Markdown

@sonar-review-alpha sonar-review-alpha Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! ✅

🗣️ Give feedback

@sonarqube-next
Copy link
Copy Markdown

Quality Gate passed Quality Gate passed

Issues
0 New issues
0 Fixed issues
0 Accepted issues

Measures
0 Security Hotspots
0 Dependency risks
No data about Coverage
No data about Duplication

See analysis details on SonarQube

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants