USN-5222-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5222-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5222-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5222-1
Related
Published
2022-01-11T20:42:28.819811Z
Modified
2022-01-11T20:42:28.819811Z
Summary
apache-log4j2 vulnerabilities
Details

It was discovered that Apache Log4j 2 was vulnerable to remote code execution (RCE) attack when configured to use a JDBC Appender with a JNDI LDAP data source URI. A remote attacker could possibly use this issue to cause a crash, leading to a denial of service. (CVE-2021-44832)

Hideki Okamoto and Guy Lederfein discovered that Apache Log4j 2 did not protect against infinite recursion in lookup evaluation. A remote attacker could possibly use this issue to cause Apache Log4j 2 to crash, leading to a denial of service. This issue only affected Ubuntu 18.04 LTS. (CVE-2021-45105)

References

Affected packages

Ubuntu:18.04:LTS / apache-log4j2

Package

Name
apache-log4j2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.12.4-0ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "liblog4j2-java-doc": "2.12.4-0ubuntu0.1",
            "liblog4j2-java": "2.12.4-0ubuntu0.1"
        }
    ]
}

Ubuntu:20.04:LTS / apache-log4j2

Package

Name
apache-log4j2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.17.1-0.20.04.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "liblog4j2-java-doc": "2.17.1-0.20.04.1",
            "liblog4j2-java": "2.17.1-0.20.04.1"
        }
    ]
}