it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Markus Koschany <apo AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5022-1] apache-log4j2 security update
- Date: Thu, 16 Dec 2021 10:29:17 +0000
- List-archive: https://lists.debian.org/msgid-search/20211216102917.GA21302 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=N4eBDwdFygLqgHEKphvLO01pELNs/pMCf6WxzpNn95Y=; b=YC EozxyNzIouIAP/1TLVBcteVNi4OAhwyj039pogLHbRii5r6jJT3H2yJ6+bZr3HtO82cz132KslkTn zzd6kwpyOwEp18FKhMqRfiNpVu1ldd5hOwdoMEE6tR/2ZJZvghOHZZOPbtG5wUP6sX4rOYF5HHEAw 7zI4xR74B+IRSjhM+QIPuPZ/rfBiOVftGJAGYDt192j0izvDqW2wCbDRz3MogA5Mxmv4s6u51n7hs pNi4mSlufeSjswdxyqP8T46wWdi6J+DdBuyfMQwXaETcVeIhb50DAAkvgF1nQ7P9PI2Bwbwxpa5y9 WbV9cSiqujdqMJ+o9/A99J7C3sMreYSQ==;
- Old-return-path: <apo AT seger.debian.org>
- Priority: urgent
- Resent-date: Thu, 16 Dec 2021 10:45:10 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <kk7Fzrt-VIG.A.D9E.2ixuhB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5022-1 security AT debian.org
https://www.debian.org/security/ Markus Koschany
December 16, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : apache-log4j2
CVE ID : CVE-2021-45046
Debian Bug : 1001729
It was found that the fix to address CVE-2021-44228 in Apache Log4j, a Logging
Framework for Java, was incomplete in certain non-default configurations. This
could allow attackers with control over Thread Context Map (MDC) input data
when the logging configuration uses a non-default Pattern Layout with either a
Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern
(%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern
resulting in a denial of service (DOS) attack.
For the oldstable distribution (buster), this problem has been fixed
in version 2.16.0-1~deb10u1.
For the stable distribution (bullseye), this problem has been fixed in
version 2.16.0-1~deb11u1.
We recommend that you upgrade your apache-log4j2 packages.
For the detailed security status of apache-log4j2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache-log4j2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=TNnt
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5022-1] apache-log4j2 security update, Markus Koschany, 16.12.2021
Archiv bereitgestellt durch MHonArc 2.6.24.