This is an automated email from the ASF dual-hosted git repository.
pkarwasz pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/logging-site.git
The following commit(s) were added to refs/heads/main by this push:
new ed177e21 Proofread CVE fix versions (#6)
ed177e21 is described below
commit ed177e21c19a52594fcde6e0aa0a60521e96a0b7
Author: Piotr P. Karwasz <[email protected]>
AuthorDate: Sun Aug 17 13:04:56 2025 +0200
Proofread CVE fix versions (#6)
For the `2.3.x` branch:
**CVE-2017-5645** (server class) was never fixed, the TCP/UDP socket server
is still there.
**CVE-2020-9488** (host name validation) was fixed in `2.3.2`:
- 3c62f0bea692456b1b5039d3bcc1c3e0ba65146a
**CVE-2021-44228** (Log4Shell) was fixed in `2.3.1`:
- be848dacbac6df30c4f32b2852e24446033ecf79
- f6564bb993d547d0a371b75d869042c334bf57f0
**CVE-2021-45046** (Log4Shell through recursive lookup evaluation) was
fixed in `2.3.1`:
- f6564bb993d547d0a371b75d869042c334bf57f0
**CVE-2021-45105** (DoS through recursive lookup evaluation) was fixed in
`2.3.1`:
- ce6b78d082aae89089cb3ad25cdd46e9ec70a70b
**CVE-2021-44832** (RCE if you have access to configuration) was fixed in
`2.3.1`:
- f6564bb993d547d0a371b75d869042c334bf57f0
* Proofread CVE fix versions for `2.12.x` branch
For the `2.12.x` branch:
**CVE-2020-9488** (host name validation) was fixed in `2.12.3`:
- 2bcba12b185200b7f3f2532cbfeff1e1da0d5c81
- bb94ea9fa921a61f90b6a934600567e719419ddd
**CVE-2021-44228** (Log4Shell) was fixed in `2.12.2`:
- 70edc233343815d5efa043b54294a6fb065aa1c5
- f819c83804152cb6ed94cb408302e36b21b65053
**CVE-2021-45046** (Log4Shell through recursive lookup evaluation) was
fixed in `2.12.3`:
- bf8ba18f63ab9f9ffd54387c5c527ecc7a681037
**CVE-2021-45105** (DoS through recursive lookup evaluation) was fixed in
`2.12.3`:
- bf7e916df6335713fe2219c7b3b523fb509deabc
**CVE-2021-44832** (RCE if you have access to configuration) was fixed in
`2.12.3`:
- bf8ba18f63ab9f9ffd54387c5c527ecc7a681037
**Note**: Unless I am mistaken, version `2.12.4` didn't contain any
security updates.
* Proofread CVE fix versions for `2.x` branch
For the `2.x` branch:
**CVE-2021-44228** (Log4Shell) was fixed in `2.15.0`:
- c77b3cb39312b83b053d23a2158b99ac7de44dd3
- 001aaada7dab82c3c09cde5f8e14245dc9d8b454
**CVE-2021-45046** (Log4Shell through recursive lookup evaluation) was
fixed in `2.16.0`:
- c362aff473e9812798ff8f25f30a2619996605d5
- 27972043b76c9645476f561c5adc483dec6d3f5d
**CVE-2021-45105** (DoS through recursive lookup evaluation) was fixed in
`2.12.3`:
- 806023265f8c905b2dd1d81fd2458f64b2ea0b5e
**CVE-2021-44832** (RCE if you have access to configuration) was fixed in
`2.12.3`:
- 95b24f77e77e4f1e5cc794df5332643e944fd6f8
**Note**: Unless I am mistaken, version `2.17.1` didn't contain any
security updates.
---
_vulnerabilities.adoc | 28 +++++++++++++++-------------
1 file changed, 15 insertions(+), 13 deletions(-)
diff --git a/_vulnerabilities.adoc b/_vulnerabilities.adoc
index 7fb02b69..31738d90 100644
--- a/_vulnerabilities.adoc
+++ b/_vulnerabilities.adoc
@@ -32,8 +32,8 @@ We only extend this mathematical notation with set union
operator (i.e., `∪`)
|Summary |JDBC appender is vulnerable to remote code execution in certain
configurations
|CVSS 3.x Score & Vector |6.6 MEDIUM
(CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)
|Components affected |`log4j-core`
-|Versions affected |`[2.0-beta7, 2.3.2) ∪ [2.4, 2.12.4) ∪ [2.13.0, 2.17.1)`
-|Versions fixed |`2.3.2` (for Java 6), `2.12.4` (for Java 7), or `2.17.1` (for
Java 8 and later)
+|Versions affected |`[2.0-beta7, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)`
+|Versions fixed |`2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for
Java 8 and later)
|===
[#CVE-2021-44832-description]
@@ -45,13 +45,14 @@ This issue is fixed by limiting JNDI data source names to
the `java` protocol.
[#CVE-2021-44832-mitigation]
==== Mitigation
-Upgrade to `2.3.2` (for Java 6), `2.12.4` (for Java 7), or `2.17.1` (for Java
8 and later).
+Upgrade to `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for Java
8 and later).
In prior releases confirm that if the JDBC Appender is being used it is not
configured to use any protocol other than `java`.
[#CVE-2021-44832-references]
==== References
- {cve-url-prefix}/CVE-2021-44832[CVE-2021-44832]
+- https://issues.apache.org/jira/browse/LOG4J2-3242[LOG4J2-3242]
[#CVE-2021-45105]
=== {cve-url-prefix}/CVE-2021-45105[CVE-2021-45105]
@@ -106,8 +107,8 @@ Independently discovered by Hideki Okamoto of Akamai
Technologies, Guy Lederfein
|Summary |Thread Context Lookup is vulnerable to remote code execution in
certain configurations
|CVSS 3.x Score & Vector |9.0 CRITICAL
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
|Components affected |`log4j-core`
-|Versions affected |`[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)`
-|Versions fixed |`2.3.1` (for Java 6), `2.12.3` (for Java 7), and `2.17.0`
(for Java 8 and later)
+|Versions affected |`[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.16.0)`
+|Versions fixed |`2.3.1` (for Java 6), `2.12.3` (for Java 7), and `2.16.0`
(for Java 8 and later)
|===
[#CVE-2021-45046-description]
@@ -126,7 +127,7 @@ Applications using only the `log4j-api` JAR file without
the `log4j-core` JAR fi
[#CVE-2021-45046-mitigation]
==== Mitigation
-Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for
Java 8 and later).
+Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.16.0` (for
Java 8 and later).
[#CVE-2021-45046-credits]
==== Credits
@@ -149,8 +150,8 @@ Additional vulnerability details discovered independently
by Ash Fox of Google,
|Summary |JNDI lookup can be exploited to execute arbitrary code loaded from
an LDAP server
|CVSS 3.x Score & Vector |10.0 CRITICAL
(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
|Components affected |`log4j-core`
-|Versions affected |`[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)`
-|Versions fixed |`2.3.1` (for Java 6), `2.12.3` (for Java 7), and `2.17.0`
(for Java 8 and later)
+|Versions affected |`[2.0-beta9, 2.3.1) ∪ [2.4, 2.12.2) ∪ [2.13.0, 2.15.0)`
+|Versions fixed |`2.3.1` (for Java 6), `2.12.2` (for Java 7), and `2.15.0`
(for Java 8 and later)
|===
[#CVE-2021-44228-description]
@@ -179,7 +180,7 @@ Log4j 1 configurations without `JMSAppender` are not
impacted by this vulnerabil
[#CVE-2021-44228-mitigation-log4j2]
===== Log4j 2 mitigation
-Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for
Java 8 and later).
+Upgrade to Log4j `2.3.1` (for Java 6), `2.12.2` (for Java 7), or `2.15.0` (for
Java 8 and later).
[#CVE-2021-44228-credits]
==== Credits
@@ -192,6 +193,7 @@ This issue was discovered by Chen Zhaojun of Alibaba Cloud
Security Team.
- {cve-url-prefix}/CVE-2021-44228[CVE-2021-44228]
- https://issues.apache.org/jira/browse/LOG4J2-3198[LOG4J2-3198]
- https://issues.apache.org/jira/browse/LOG4J2-3201[LOG4J2-3201]
+- https://issues.apache.org/jira/browse/LOG4J2-3242[LOG4J2-3242]
[#CVE-2020-9488]
=== {cve-url-prefix}/CVE-2020-9488[CVE-2020-9488]
@@ -201,8 +203,8 @@ This issue was discovered by Chen Zhaojun of Alibaba Cloud
Security Team.
|Summary |Improper validation of certificate with host mismatch in SMTP
appender
|CVSS 3.x Score & Vector |3.7 LOW
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
|Components affected |`log4j-core`
-|Versions affected |`[2.0-beta1, 2.12.3) ∪ [2.13.1, 2.13.2)`
-|Versions fixed |`2.12.3` (Java 7) and `2.13.2` (Java 8 and later)
+|Versions affected |`[2.0-beta1, 2.3.2) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.13.2)`
+|Versions fixed |`2.3.2` (for Java 6), `2.12.3` (for Java 7) and `2.13.2` (for
Java 8 and later)
|===
[#CVE-2020-9488-description]
@@ -220,7 +222,7 @@ Usages of `SslConfiguration` that are configured via system
properties are not a
[#CVE-2020-9488-mitigation]
==== Mitigation
-Upgrade to `2.12.3` (Java 7) or `2.13.2` (Java 8 and later).
+Upgrade to `2.3.2` (Java 6), `2.12.3` (Java 7) or `2.13.2` (Java 8 and later).
Alternatively, users can set the `mail.smtp.ssl.checkserveridentity` system
property to `true` to enable SMTPS hostname verification for all SMTPS mail
sessions.
@@ -244,7 +246,7 @@ This issue was discovered by Peter Stöckli.
|CVSS 2.0 Score & Vector |7.5 HIGH (AV:N/AC:L/Au:N/C:P/I:P/A:P)
|Components affected |`log4j-core`
|Versions affected |`[2.0-alpha1, 2.8.2)`
-|Versions fixed |`2.8.2` (Java 7)
+|Versions fixed |`2.8.2` (for Java 7 and later)
|===
[#CVE-2017-5645-description]