GEODE-10579: Remediate CVE-2026-34478 - Improper Output Neutralization for Logs#8005
Open
JinwooHwang wants to merge 1 commit intoapache:developfrom
Open
GEODE-10579: Remediate CVE-2026-34478 - Improper Output Neutralization for Logs#8005JinwooHwang wants to merge 1 commit intoapache:developfrom
JinwooHwang wants to merge 1 commit intoapache:developfrom
Conversation
…n for Logs Upgrade Apache Log4j from 2.25.3 to 2.25.4 to remediate CVE-2026-34478 (CVSS 6.9 MEDIUM). VULNERABILITY: Log4j Core's Rfc5424Layout (versions 2.21.0 through 2.25.3) is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes (CWE-117, CWE-684). Two issues affect users of stream-based syslog services: - The newLineEscape attribute was silently renamed, disabling newline escaping for TCP framing (RFC 6587) and exposing CRLF injection. - The useTlsMessageFormat attribute was silently renamed, silently downgrading TLS framing (RFC 5425) to unframed TCP without newline escaping. REMEDIATION: Updated all Log4j dependency references from 2.25.3 to 2.25.4 across dependency constraints, build files, documentation, and test resources. References: https://nvd.nist.gov/vuln/detail/CVE-2026-34478 apache/logging-log4j2#4074 https://logging.apache.org/security.html#CVE-2026-34478
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Upgrade Apache Log4j from 2.25.3 to 2.25.4 to remediate CVE-2026-34478.
Security Vulnerability
Description
Log4j Core's
Rfc5424Layout(versions 2.21.0 through 2.25.3) is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes. Two distinct issues affect users of stream-based syslog services who configureRfc5424Layoutdirectly:newLineEscapeattribute silently renamed — Newline escaping stopped working for users of TCP framing (RFC 6587), exposing them to CRLF injection in log output.useTlsMessageFormatattribute silently renamed — Users of TLS framing (RFC 5425) were silently downgraded to unframed TCP (RFC 6587) without newline escaping.Changes
Pure version string replacement of
2.25.3→2.25.4across 10 files (33 insertions, 33 deletions):build-tools/geode-dependency-management/.../DependencyConstraints.groovygeode-assembly/.../management/build.gradlelog4j-slf4j-impldependencyboms/geode-all-bom/.../expected-pom.xml<version>entries in expected POMgeode-assembly/.../assembly_content.txtgeode-assembly/.../gfsh_dependency_classpath.txtgeode-server-all/.../dependency_classpath.txtgeode-docs/.../configuring_log4j2.html.md.erbgeode-docs/.../how_logging_works.html.md.erbgeode-docs/.../weblogic_setting_up_the_module.html.md.erbNo code logic changes — this is a dependency version bump only.
Verification
./gradlew test— BUILD SUCCESSFUL2.25.3in the codebaseorigin/developwith no merge conflictsReferences
Rfc5424Layoutattributes logging-log4j2#4074For all changes, please confirm:
develop)?gradlew buildrun cleanly?