{"affected":[{"ecosystem_specific":{"binaries":[{"log4j":"2.13.0-4.6.1","log4j-javadoc":"2.13.0-4.6.1","log4j-jcl":"2.13.0-4.6.1","log4j-slf4j":"2.13.0-4.6.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"log4j","purl":"pkg:rpm/opensuse/log4j&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.13.0-4.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for log4j fixes the following issue:\n\nCVE-2021-44228: The previously published fix by upstream turned out to be\nincomplete. Therefore, upstream has recommended disabling JNDI support in log4j\nby default to be completely sure that this vulnerability cannot be exploited.\n\nThis update implements that recommendation and disables JNDI support by\ndefault. [bsc#1193611, CVE-2021-44228]\n\nCVE-2021-45046: A Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack \nis also fixed by disabling JNDI support by default (bsc#1193743)\n","id":"openSUSE-SU-2021:4094-1","modified":"2021-12-15T10:17:28Z","published":"2021-12-15T10:17:28Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDZ2MV2SSNKVN4EVV5AQ3HGQ2G4U2JHS/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-44228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-45046"}],"related":["CVE-2021-44228","CVE-2021-45046"],"summary":"Security update for log4j","upstream":["CVE-2021-44228","CVE-2021-45046"]}