parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack.
v1.14.2
Either of the following:
FLUENT_PLUGIN
or --plugin
option of fluentd).github.com/fluent/fluentd
github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142
github.com/fluent/fluentd/commit/5482a3d049dab351de0be68f4b4bc562319d8511
github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662
github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md
github.com/rubysec/ruby-advisory-db/blob/master/gems/fluentd/CVE-2021-41186.yml
nvd.nist.gov/vuln/detail/CVE-2021-41186