Headline
RHSA-2022:0439: Red Hat Security Advisory: rh-maven36-log4j12 security update
An update for rh-maven36-log4j12 is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-23302: log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
- CVE-2022-23305: log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
- CVE-2022-23307: log4j: Unsafe deserialization flaw in Chainsaw log viewer
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
- Red Hat CodeReady Studio
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2022-02-03
Updated:
2022-02-03
RHSA-2022:0439 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: rh-maven36-log4j12 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for rh-maven36-log4j12 is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Log4j is a tool to help the programmer output log statements to a variety of output targets.
Security Fix(es):
- log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305)
- log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307)
- log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
- Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
- Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
- Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64
Fixes
- BZ - 2041949 - CVE-2022-23302 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
- BZ - 2041959 - CVE-2022-23305 log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
- BZ - 2041967 - CVE-2022-23307 log4j: Unsafe deserialization flaw in Chainsaw log viewer
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7
SRPM
rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm
SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0
x86_64
rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm
SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70
rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm
SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702
Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7
SRPM
rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm
SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0
s390x
rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm
SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70
rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm
SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702
Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7
SRPM
rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm
SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0
ppc64le
rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm
SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70
rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm
SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702
Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7
SRPM
rh-maven36-log4j12-1.2.17-23.4.el7.src.rpm
SHA-256: bd7c815e1e67ada9ea1b5e53baa53a2d1e49b6c2cabc3ea7eceb1ca0c06989d0
x86_64
rh-maven36-log4j12-1.2.17-23.4.el7.noarch.rpm
SHA-256: c9e04466bef4a3d54b780b0f4f0650c9c579fa66f39dc4bb323260438b40df70
rh-maven36-log4j12-javadoc-1.2.17-23.4.el7.noarch.rpm
SHA-256: 437f8f2419c69b5f528a5cf81e0ed553fd488a634597b5e21efcd58c8c57f702
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.