Debian 10225 Published by

An apache-log4j2 security update has been released for Debian GNU/Linux 9 LTS to address an issue that can result in a remote code execution (RCE) attack.



DLA 2870-1: apache-log4j2 security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-2870-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/ Markus Koschany
December 29, 2021   https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : apache-log4j2
Version : 2.12.4-0+deb9u1
CVE ID : CVE-2021-44832
Debian Bug : 1002813

Apache Log4j2, a Java Logging Framework, is vulnerable to a remote code
execution (RCE) attack where an attacker with permission to modify the logging
configuration file can construct a malicious configuration using a JDBC
Appender with a data source referencing a JNDI URI which can execute remote
code. This issue is fixed by limiting JNDI data source names to the java
protocol.

For Debian 9 stretch, this problem has been fixed in version
2.12.4-0+deb9u1.

We recommend that you upgrade your apache-log4j2 packages.

For the detailed security status of apache-log4j2 please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/apache-log4j2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS