Mageia 2022-0002: log4j security update
Summary
Apache Log4j2 is vulnerable to a remote code execution (RCE) attack where
an attacker with permission to modify the logging configuration file can
construct a malicious configuration using a JDBC Appender with a data
source referencing a JNDI URI which can execute remote code. This issue is
fixed by limiting JNDI data source names to the java protocol
References
- https://bugs.mageia.org/show_bug.cgi?id=29827
- https://www.openwall.com/lists/oss-security/2021/12/28/1
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD3TW7GD6PF3ZSKL2TJG3Z462FFFLJND/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832
Resolution
MGASA-2022-0002 - Updated log4j packages fix security vulnerability
SRPMS
- 8/core/log4j-2.17.1-1.mga8