it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Markus Koschany <apo AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5024-1] apache-log4j2 security update
- Date: Sat, 18 Dec 2021 20:39:14 +0000
- List-archive: https://lists.debian.org/msgid-search/20211218203914.GA17483 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=Fb/5V8tU55CY0Gmzw4TjZZF9QZRfnQS6wz8NKR6USgA=; b=PU pkD0tZGkG0wUrSLNWQSKO3oNnQYPgYznisIYzFC23dIoOowICEAxSuSQK84R64iB7UATZjOYAfDy2 qAP5cywwsR3mxVChe4h0VtQQr1BxAW/CbeW8hHsEqPIZM9ook86xeT6wbkB1nx6xaDB1ZrCHlWg5A rAvwWJYQLQtPjAoBWrWxxoa0hk7J9QpTqGRIEEi9d9PQQhd2e+mrrvXK7Rky1BAvlHy4F0wll20J/ bUurGfkLzfGIJIkwl8f1uRaxhGAcaTH96UXP9xV8ajoIExKAGFcOo57q27LKiS1Eys8H7WYSVCe3G pg/z5HJ0YUxCVz713LsksQd0XkWxY1Ww==;
- Old-return-path: <apo AT seger.debian.org>
- Priority: urgent
- Resent-date: Sat, 18 Dec 2021 20:57:10 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <wmNUSR9mqf.A.Ou.mskvhB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5024-1 security AT debian.org
https://www.debian.org/security/ Markus Koschany
December 18, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : apache-log4j2
CVE ID : CVE-2021-45105
Debian Bug : 1001891
It was found that Apache Log4j2, a Logging Framework for Java, did not protect
from uncontrolled recursion from self-referential lookups. When the logging
configuration uses a non-default Pattern Layout with a Context Lookup (for
example, $${ctx:loginId}), attackers with control over Thread Context Map
(MDC)
input data can craft malicious input data that contains a recursive lookup,
resulting in a denial of service.
For the oldstable distribution (buster), this problem has been fixed
in version 2.17.0-1~deb10u1.
For the stable distribution (bullseye), this problem has been fixed in
version 2.17.0-1~deb11u1.
We recommend that you upgrade your apache-log4j2 packages.
For the detailed security status of apache-log4j2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache-log4j2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Wkr6
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5024-1] apache-log4j2 security update, Markus Koschany, 18.12.2021
Archiv bereitgestellt durch MHonArc 2.6.24.