First published: Wed Jun 15 2022(Updated: )
Log4j is a tool to help the programmer output log statements to a variety of output targets.<br>Security Fix(es):<br><li> log4j: deserialization of untrusted data in SocketServer (CVE-2019-17571)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/log4j | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
redhat/log4j | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
redhat/log4j-debuginfo | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
redhat/log4j-javadoc | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
redhat/log4j-manual | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
redhat/log4j-debuginfo | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
redhat/log4j-javadoc | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
redhat/log4j-manual | <1.2.14-6.7.el6_10 | 1.2.14-6.7.el6_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:5053 is classified as critical due to the potential for remote code execution.
To fix RHSA-2022:5053, update affected packages to version 1.2.14-6.7.el6_10 or later.
RHSA-2022:5053 addresses the vulnerability CVE-2019-17571 related to the deserialization of untrusted data in SocketServer.
Affected packages include log4j, log4j-javadoc, log4j-debuginfo, and log4j-manual, all prior to version 1.2.14-6.7.el6_10.
You can check your installed version of the log4j package and compare it against the version 1.2.14-6.7.el6_10 to assess vulnerability.