Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/apache-log4j2@2.17.1-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache-log4j2@2.17.1-1~deb11u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (9)
Vulnerability Summary Aliases
VCID-4nzu-3a6y-jqab CVE-2026-34477
GHSA-6hg6-v5c8-fphq
VCID-74dr-6hxt-tbgu In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. CVE-2017-5645
GHSA-fxph-q3j8-mv87
VCID-8977-tjss-w7ba Incomplete fix for Apache Log4j vulnerability The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. CVE-2021-45046
GHSA-7rjr-3q55-vv33
VCID-gcyx-fdns-k3bt Apache Log4j does not verify the TLS hostname in its Socket Appender The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the [verifyHostName](https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName) configuration attribute or the [log4j2.sslVerifyHostName](https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName) system property is set to true. This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions: * The attacker is able to intercept or redirect network traffic between the client and the log receiver. * The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured). Users are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue. As an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates. CVE-2025-68161
GHSA-vc5p-v9hr-52mj
VCID-jwav-88m7-6fhz Remote code injection in Log4j Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. CVE-2021-44228
GHSA-jfh8-c2jp-5v3q
VCID-mz9r-j78c-dfe3 Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. CVE-2020-9488
GHSA-vwqq-5vrc-xw9h
VCID-r67p-yqg2-9bbq Improper Input Validation and Injection in Apache Log4j2 Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. CVE-2021-44832
GHSA-8489-44mv-ggj8
VCID-s9nz-6x8z-ykgz CVE-2026-34478
GHSA-445c-vh5m-36rj
VCID-sjuz-dd96-sqe3 Uncontrolled Recursion This advisory has been marked as a false positive. CVE-2021-45105
GHSA-p6xc-xr62-6r2g

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:02:56.322468+00:00 Debian Importer Fixing VCID-8977-tjss-w7ba https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:52:52.669880+00:00 Debian Importer Fixing VCID-sjuz-dd96-sqe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:04:04.551810+00:00 Debian Importer Fixing VCID-mz9r-j78c-dfe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:58:46.731691+00:00 Debian Importer Fixing VCID-s9nz-6x8z-ykgz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:11.314282+00:00 Debian Importer Fixing VCID-r67p-yqg2-9bbq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:04:38.594276+00:00 Debian Importer Fixing VCID-4nzu-3a6y-jqab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:16.700684+00:00 Debian Importer Fixing VCID-74dr-6hxt-tbgu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:28:05.902530+00:00 Debian Importer Fixing VCID-jwav-88m7-6fhz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:58:11.383274+00:00 Debian Importer Fixing VCID-8977-tjss-w7ba https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:50:33.599652+00:00 Debian Importer Fixing VCID-sjuz-dd96-sqe3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:44.074239+00:00 Debian Importer Fixing VCID-mz9r-j78c-dfe3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:33.249124+00:00 Debian Importer Fixing VCID-r67p-yqg2-9bbq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:01.032469+00:00 Debian Importer Fixing VCID-74dr-6hxt-tbgu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.601475+00:00 Debian Importer Fixing VCID-s9nz-6x8z-ykgz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.570271+00:00 Debian Importer Fixing VCID-4nzu-3a6y-jqab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:18:51.323882+00:00 Debian Importer Fixing VCID-jwav-88m7-6fhz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:19:40.428260+00:00 Debian Importer Fixing VCID-gcyx-fdns-k3bt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:09.068290+00:00 Debian Importer Fixing VCID-8977-tjss-w7ba https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:26.446612+00:00 Debian Importer Fixing VCID-sjuz-dd96-sqe3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:38.333213+00:00 Debian Importer Fixing VCID-mz9r-j78c-dfe3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:41.063304+00:00 Debian Importer Fixing VCID-r67p-yqg2-9bbq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:26.313184+00:00 Debian Importer Fixing VCID-74dr-6hxt-tbgu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:56.927463+00:00 Debian Importer Fixing VCID-jwav-88m7-6fhz https://security-tracker.debian.org/tracker/data/json 38.1.0