发布时间: 2022年9月23日
修改时间: 2022年9月23日
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.
NVD | openEuler | |
---|---|---|
CVSS评分 | 5.9 | 7.5 |
Attack Vector | Network | Network |
Attack Complexity | High | Low |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | None | None |
Integrity | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-2119 | log4j security update | 2022年9月23日 |
KylinSec-SA-2022-2814 | log4j security update | 2022年9月23日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | log4j | Fixed |
KY3.4-5A | log4j | Fixed |