No analysis available yet.
Vendor Workaround
Implement one of the following mitigation techniques: * Java 8 (or later) users should upgrade to release 2.17.0. Alternatively, this can be mitigated in configuration: * In PatternLayout in the logging configuration, replace Context Lookups like `${ctx:loginId}` or `$${ctx:loginId}` with Thread Context Map patterns (%X, %mdc, or %MDC). * Otherwise, in the configuration, remove references to Context Lookups like `${ctx:loginId}` or `$${ctx:loginId}` where they originate from sources external to the application such as HTTP headers or user input.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2852-1 | apache-log4j2 security update |
Debian DSA |
DSA-5024-1 | apache-log4j2 security update |
Github GHSA |
GHSA-p6xc-xr62-6r2g | Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion |
Ubuntu USN |
USN-5203-1 | Apache Log4j 2 vulnerability |
Ubuntu USN |
USN-5222-1 | Apache Log4j 2 vulnerabilities |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T04:39:20.295Z
Reserved: 2021-12-16T00:00:00.000Z
Link: CVE-2021-45105
No data.
Status : Modified
Published: 2021-12-18T12:15:07.433
Modified: 2024-11-21T06:31:58.170
Link: CVE-2021-45105
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN