摘要:
log4j security update
安全等级: High
公告ID: KylinSec-SA-2022-2814
发布日期: 2024年10月31日
关联CVE: CVE-2021-45105 CVE-2021-44832
Log4j is a tool to help the programmer output log statements to a variety of output targets.
Security Fix(es):
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.(CVE-2021-45105)
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.(CVE-2021-44832)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-45105 | KY3.4-4A | log4j,mybatis,netty,springframework,wildfly-security-manager,wildfly-elytron,wildfly-build-tools,wildfly-common,wildfly-core,thrift,json-lib,datanucleus-core,jgroups,mx4j,jboss-logging,infinispan,datanucleus-rdbms,avalon-logkit,datanucleus-api-jdo,avalon-framework,HikariCP,metrics | Fixed |
CVE-2021-44832 | KY3.4-4A | log4j,mybatis,netty,springframework,wildfly-security-manager,wildfly-elytron,wildfly-build-tools,wildfly-common,wildfly-core,thrift,json-lib,datanucleus-core,jgroups,mx4j,jboss-logging,infinispan,datanucleus-rdbms,avalon-logkit,datanucleus-api-jdo,avalon-framework,HikariCP,metrics | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
log4j-jmx-gui | noarch | 2.17.0-3.kb1.ky3_4 |
log4j-web | noarch | 2.17.0-3.kb1.ky3_4 |
log4j-taglib | noarch | 2.17.0-3.kb1.ky3_4 |
log4j-bom | noarch | 2.17.0-3.kb1.ky3_4 |
log4j-slf4j | noarch | 2.17.0-3.kb1.ky3_4 |
log4j | noarch | 2.17.0-3.kb1.ky3_4 |
log4j-help | noarch | 2.17.0-3.kb1.ky3_4 |
log4j-jcl | noarch | 2.17.0-3.kb1.ky3_4 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名