-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.0120.2
                      apache-log4j1.2 security update
                                18 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           apache-log4j1.2
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Debian GNU/Linux 9
                   Debian GNU/Linux 10
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17571  

Reference:         ESB-2020.0098

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2064
   https://www.debian.org/security/2020/dsa-4686

Comment: This bulletin contains two (2) Debian security advisories.

Revision History:  May     18 2020: Vendor released updated affected OS list
                   January 13 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : apache-log4j1.2
Version        : 1.2.17-5+deb8u1
CVE ID         : CVE-2019-17571
Debian Bug     : 947124

Included in Log4j 1.2, a logging library for Java, is a SocketServer
class that is vulnerable to deserialization of untrusted data which can
be exploited to remotely execute arbitrary code when combined with a
deserialization gadget when listening to untrusted network traffic for
log data.

For Debian 8 "Jessie", this problem has been fixed in version
1.2.17-5+deb8u1.

We recommend that you upgrade your apache-log4j1.2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=Fs7B
- -----END PGP SIGNATURE-----

- -----------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4686-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
May 16, 2020                          https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : apache-log4j1.2
CVE ID         : CVE-2019-17571
Debian Bug     : 947124

It was discovered that the SocketServer class included in
apache-log4j1.2, a logging library for java, is vulnerable to
deserialization of untrusted data. An attacker can take advantage of
this flaw to execute arbitrary code in the context of the logger
application by sending a specially crafted log event.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.2.17-7+deb9u1.

For the stable distribution (buster), this problem has been fixed in
version 1.2.17-8+deb10u1.

We recommend that you upgrade your apache-log4j1.2 packages.

For the detailed security status of apache-log4j1.2 please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/apache-log4j1.2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=eH9L
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=twq7
-----END PGP SIGNATURE-----