openSUSE: 2021:1586-1 important: log4j

Advisories


   openSUSE Security Update: Security update for log4j
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:1586-1
Rating:             important
References:         #1193611 
Cross-References:   CVE-2021-44228
CVSS scores:
                    CVE-2021-44228 (NVD) : 10 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
                    CVE-2021-44228 (SUSE): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:

   This update for log4j fixes the following issue:

   CVE-2021-44228: The previously published fix by upstream turned out to be
   incomplete. Therefore, upstream has recommended disabling JNDI support in
   log4j by default to be completely sure that this vulnerability cannot be
   exploited. This update implements that recommendation and disables JNDI
   support by default. [bsc#1193611, CVE-2021-44228]

   This update was imported from the SUSE:SLE-15-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-1586=1



Package List:

   - openSUSE Leap 15.2 (noarch):

      log4j-2.13.0-lp152.3.6.1
      log4j-javadoc-2.13.0-lp152.3.6.1
      log4j-jcl-2.13.0-lp152.3.6.1
      log4j-slf4j-2.13.0-lp152.3.6.1


References:

   https://www.suse.com/security/cve/CVE-2021-44228.html
   https://bugzilla.suse.com/1193611

openSUSE: 2021:1586-1 important: log4j

December 15, 2021
An update that fixes one vulnerability is now available

Description

This update for log4j fixes the following issue: CVE-2021-44228: The previously published fix by upstream turned out to be incomplete. Therefore, upstream has recommended disabling JNDI support in log4j by default to be completely sure that this vulnerability cannot be exploited. This update implements that recommendation and disables JNDI support by default. [bsc#1193611, CVE-2021-44228] This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch

To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1586=1

Package List

- openSUSE Leap 15.2 (noarch): log4j-2.13.0-lp152.3.6.1 log4j-javadoc-2.13.0-lp152.3.6.1 log4j-jcl-2.13.0-lp152.3.6.1 log4j-slf4j-2.13.0-lp152.3.6.1

References

https://www.suse.com/security/cve/CVE-2021-44228.html https://bugzilla.suse.com/1193611

Severity
Announcement ID: openSUSE-SU-2021:1586-1
Rating: important
Affected Products: openSUSE Leap 15.2 .

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.