• 公告ID (KylinSec-SA-2022-2119)

摘要:

log4j security update

安全等级: High

公告ID: KylinSec-SA-2022-2119

发布日期: 2022年9月23日

关联CVE: CVE-2021-45105   CVE-2021-45046   CVE-2021-44832  

  • 详细介绍

1. 漏洞描述

   

Log4j is a tool to help the programmer output log statements to a variety of output targets.

Security Fix(es):

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.(CVE-2021-45046)

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.(CVE-2021-45105)

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.(CVE-2021-44832)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-45105 KY3.4-5A log4j Fixed
CVE-2021-45046 KY3.4-5A log4j Fixed
CVE-2021-44832 KY3.4-5A log4j Fixed

3. 影响组件

    log4j

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
log4j-web noarch 2.17.0-3.kb1.ky3_4
log4j-slf4j noarch 2.17.0-3.kb1.ky3_4
log4j-bom noarch 2.17.0-3.kb1.ky3_4
log4j-help noarch 2.17.0-3.kb1.ky3_4
log4j noarch 2.17.0-3.kb1.ky3_4
log4j-taglib noarch 2.17.0-3.kb1.ky3_4
log4j-jmx-gui noarch 2.17.0-3.kb1.ky3_4
log4j-jcl noarch 2.17.0-3.kb1.ky3_4

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     log4j-web   

     log4j-slf4j   

     log4j-bom   

     log4j-help   

     log4j   

     log4j-taglib   

     log4j-jmx-gui   

     log4j-jcl   

aarch64:

     log4j-web   

     log4j-slf4j   

     log4j-bom   

     log4j-help   

     log4j   

     log4j-taglib   

     log4j-jmx-gui   

     log4j-jcl   

上一篇:KylinSec-SA-2022-2118 下一篇:KylinSec-SA-2022-2120