Amazon Linux 2 Security Advisory: ALAS-2022-1750
Advisory Release Date: 2022-02-15 22:54 Pacific
Advisory Updated Date: 2022-02-21 20:53 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSSink in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if JMSSink is deployed and has been configured to perform JNDI requests. (CVE-2022-23302)
A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens. (CVE-2022-23305)
A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run. (CVE-2022-23307)
Affected Packages:
log4j
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update log4j to update your system.
noarch:
log4j-1.2.17-18.amzn2.noarch
log4j-manual-1.2.17-18.amzn2.noarch
log4j-javadoc-1.2.17-18.amzn2.noarch
src:
log4j-1.2.17-18.amzn2.src