CVE-2021-42550

NameCVE-2021-42550
DescriptionIn logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
logback (PTS)bullseye1:1.2.3-6vulnerable
bookworm1:1.2.11-3fixed
sid, trixie1:1.2.11-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
logbacksource(unstable)1:1.2.8-1

Notes

[bullseye] - logback <no-dsa> (Minor issue)
[buster] - logback <no-dsa> (Minor issue)
[stretch] - logback <no-dsa> (Minor issue)
https://jira.qos.ch/browse/LOGBACK-1591
https://github.com/qos-ch/logback/commit/21d772f2bc2ed780b01b4fe108df7e29707763f1 (v_1.2.8)

Search for package or bug name: Reporting problems