[Git][security-tracker-team/security-tracker][master] Mark CVE in log4j1.2 as fixed in unstable
Markus Koschany (@apo)
apo at debian.org
Mon Jan 31 11:03:52 GMT 2022
Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c7162ed0 by Markus Koschany at 2022-01-31T12:02:06+01:00
Mark CVE in log4j1.2 as fixed in unstable
Remove no-dsa tag for CVE-2021-4104/Stretch
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3275,12 +3275,12 @@ CVE-2022-0266 (Authorization Bypass Through User-Controlled Key in Packagist rem
CVE-2022-0265
RESERVED
CVE-2022-23307 (CVE-2020-9493 identified a deserialization issue that was present in A ...)
- - apache-log4j1.2 <unfixed> (bug #1004482)
+ - apache-log4j1.2 1.2.17-11 (bug #1004482)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/5
CVE-2022-23306
RESERVED
CVE-2022-23305 (By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as ...)
- - apache-log4j1.2 <unfixed> (bug #1004482)
+ - apache-log4j1.2 1.2.17-11 (bug #1004482)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/4
CVE-2022-0263 (Unrestricted Upload of File with Dangerous Type in Packagist pimcore/p ...)
NOT-FOR-US: pimcore
@@ -3343,7 +3343,7 @@ CVE-2022-0244 (An issue has been discovered in GitLab CE/EE affecting all versio
CVE-2022-0243 (Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.C ...)
NOT-FOR-US: Orchard CMS
CVE-2022-23302 (JMSSink in all versions of Log4j 1.x is vulnerable to deserialization ...)
- - apache-log4j1.2 <unfixed> (bug #1004482)
+ - apache-log4j1.2 1.2.17-11 (bug #1004482)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/3
CVE-2022-22142
RESERVED
@@ -11020,10 +11020,9 @@ CVE-2018-25021 (The TCP Server module in toxcore before 0.2.8 doesn't free the T
CVE-2021-44833 (The CLI 1.0.0 for Amazon AWS OpenSearch has weak permissions for the c ...)
NOT-FOR-US: CLI for Amazon AWS OpenSearch
CVE-2021-4104 (JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted ...)
- - apache-log4j1.2 <unfixed>
+ - apache-log4j1.2 1.2.17-11
[bullseye] - apache-log4j1.2 <no-dsa> (Minor issue; JMSAppender not configured to be used by default)
[buster] - apache-log4j1.2 <no-dsa> (Minor issue; JMSAppender not configured to be used by default)
- [stretch] - apache-log4j1.2 <no-dsa> (Minor issue; JMSAppender not configured to be used by default)
NOTE: https://www.openwall.com/lists/oss-security/2021/12/13/1
NOTE: https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
NOTE: Issue for Log4j 1.2 when specifically configured to use JMSAppender (not the default)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7162ed0a5b2f935522447aacdf599b0aed1d258
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7162ed0a5b2f935522447aacdf599b0aed1d258
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220131/a3a11053/attachment.htm>
More information about the debian-security-tracker-commits
mailing list