MGASA-2021-0566

Source
https://advisories.mageia.org/MGASA-2021-0566.html
Import Source
https://advisories.mageia.org/MGASA-2021-0566.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0566
Related
Published
2021-12-19T12:26:08Z
Modified
2021-12-19T11:49:45Z
Summary
Updated log4j packages fix security vulnerability
Details

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a denial of service (DOS) attack. Log4j 2.15.0 makes a best-effort attempt to restrict JNDI LDAP lookups to localhost by default. Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default (CVE-2021-45046).

References
Credits

Affected packages

Mageia:8 / log4j

Package

Name
log4j
Purl
pkg:rpm/mageia/log4j?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.16.0-1.mga8

Ecosystem specific

{
    "section": "core"
}