Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:0439: Red Hat Security Advisory: rh-maven36-log4j12 security update

An update for rh-maven36-log4j12 is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-23302: log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
  • CVE-2022-23305: log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
  • CVE-2022-23307: log4j: Unsafe deserialization flaw in Chainsaw log viewer
Red Hat Security Data
#sql#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Red Hat Customer Portal

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2022-02-03

Updated:

2022-02-03

RHSA-2022:0439 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: rh-maven36-log4j12 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for rh-maven36-log4j12 is now available for Red Hat Software Collections.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Log4j is a tool to help the programmer output log statements to a variety of output targets.

Security Fix(es):

  • log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305)
  • log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307)
  • log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
  • Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
  • Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
  • Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64

Fixes

  • BZ - 2041949 - CVE-2022-23302 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
  • BZ - 2041959 - CVE-2022-23305 log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
  • BZ - 2041967 - CVE-2022-23307 log4j: Unsafe deserialization flaw in Chainsaw log viewer

Red Hat Software Collections (for RHEL Server) 1 for RHEL 7

SRPM

rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm

SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0

x86_64

rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm

SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70

rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm

SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702

Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7

SRPM

rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm

SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0

s390x

rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm

SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70

rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm

SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702

Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7

SRPM

rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm

SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0

ppc64le

rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm

SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70

rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm

SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702

Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7

SRPM

rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm

SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0

x86_64

rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm

SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70

rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm

SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update