CVE-2017-5645

Priority
Description
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP
socket server to receive serialized log events from another application, a
specially crafted binary payload can be sent that, when deserialized, can
execute arbitrary code.
Notes
Package
Upstream:released (2.7-2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2.10.0-2)
Ubuntu 19.04 (Disco Dingo):not-affected (2.10.0-2)
Ubuntu 19.10 (Eoan Ermine):not-affected (2.10.0-2)
Ubuntu 20.04 (Focal Fossa):not-affected (2.10.0-2)
More Information

Updated: 2019-12-05 19:48:25 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)