Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-34477 (GCVE-0-2026-34477)
Vulnerability from cvelistv5 – Published: 2026-04-10 15:36 – Updated: 2026-04-10 17:38- CWE-297 - Improper Validation of Certificate with Host Mismatch
| URL | Tags |
|---|---|
| https://github.com/apache/logging-log4j2/pull/4075 | patch |
| https://logging.apache.org/security.html#CVE-2026-34477 | vendor-advisory |
| https://logging.apache.org/cyclonedx/vdr.xml | vendor-advisory |
| https://logging.apache.org/log4j/2.x/manual/appen… | related |
| https://lists.apache.org/thread/lkx8cl46t2bvkcwfc… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Apache Software Foundation | Apache Log4j Core |
Affected:
2.12.0 , < 2.25.4
(maven)
Affected: 3.0.0-alpha1 , ≤ 3.0.0-beta3 (maven) cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34477",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-10T17:36:46.652477Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-10T17:38:57.154Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"cpes": [
"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"packageName": "org.apache.logging.log4j:log4j-core",
"packageURL": "pkg:maven/org.apache.logging.log4j/log4j-core",
"product": "Apache Log4j Core",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "2.25.4",
"status": "affected",
"version": "2.12.0",
"versionType": "maven"
},
{
"lessThanOrEqual": "3.0.0-beta3",
"status": "affected",
"version": "3.0.0-alpha1",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Samuli Leinonen (original reporter)"
},
{
"lang": "en",
"type": "finder",
"value": "Naresh Kandula (independently)"
},
{
"lang": "en",
"type": "finder",
"value": "Vitaly Simonovich (independently)"
},
{
"lang": "en",
"type": "finder",
"value": "Raijuna (independently)"
},
{
"lang": "en",
"type": "finder",
"value": "Danish Siddiqui (djvirus, independently)"
},
{
"lang": "en",
"type": "finder",
"value": "Markus Magnuson (independently)"
},
{
"lang": "en",
"type": "finder",
"value": "Haruki Oyama (Waseda University, independently)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe fix for \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://logging.apache.org/security.html#CVE-2025-68161\"\u003eCVE-2025-68161\u003c/a\u003e was incomplete: it addressed hostname verification only when enabled via the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName\"\u003e\u003ccode\u003elog4j2.sslVerifyHostName\u003c/code\u003e\u003c/a\u003e system property, but not when configured through the \u003ccode\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName\"\u003everifyHostName\u003c/a\u003e\u003c/code\u003e attribute of the \u003ccode\u003e\u0026lt;Ssl\u0026gt;\u003c/code\u003e element.\u003c/p\u003e\u003cp\u003eAlthough the \u003ccode\u003everifyHostName\u003c/code\u003e configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\u003c/p\u003e\u003cp\u003eA network-based attacker may be able to perform a man-in-the-middle attack when \u003cstrong\u003eall\u003c/strong\u003e of the following conditions are met:\u003c/p\u003e\u003col\u003e\u003cli\u003eAn SMTP, Socket, or Syslog appender is in use.\u003c/li\u003e\u003cli\u003eTLS is configured via a nested \u003ccode\u003e\u0026lt;Ssl\u0026gt;\u003c/code\u003e element.\u003c/li\u003e\u003cli\u003eThe attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eThis issue does not affect users of the HTTP appender, which uses a separate \u003ccode\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName\"\u003everifyHostname\u003c/a\u003e\u003c/code\u003e attribute that was not subject to this bug and verifies host names by default.\u003c/p\u003e\u003cp\u003eUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.\u003c/p\u003e"
}
],
"value": "The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\n\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\n\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\n\n * An SMTP, Socket, or Syslog appender is in use.\n * TLS is configured via a nested \u003cSsl\u003e element.\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"other": {
"content": {
"text": "moderate"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-297",
"description": "CWE-297 Improper Validation of Certificate with Host Mismatch",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-10T15:36:19.740Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://github.com/apache/logging-log4j2/pull/4075"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://logging.apache.org/security.html#CVE-2026-34477"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://logging.apache.org/cyclonedx/vdr.xml"
},
{
"tags": [
"related"
],
"url": "https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://lists.apache.org/thread/lkx8cl46t2bvkcwfcb2pd43ygc097lq4"
}
],
"source": {
"discovery": "EXTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2025-12-20T19:05:00.000Z",
"value": "Vulnerability reported by Samuli Leinonen"
},
{
"lang": "en",
"time": "2025-12-30T22:57:00.000Z",
"value": "Candidate patch shared internally by Piotr P. Karwasz"
},
{
"lang": "en",
"time": "2026-02-25T19:35:00.000Z",
"value": "Independent report received from Naresh Kandula"
},
{
"lang": "en",
"time": "2026-03-01T23:01:00.000Z",
"value": "Independent report received from Vitaly Simonovich"
},
{
"lang": "en",
"time": "2026-03-02T06:31:00.000Z",
"value": "Independent report received from Raijuna"
},
{
"lang": "en",
"time": "2026-03-08T18:17:00.000Z",
"value": "Independent report received from Danish Siddiqui"
},
{
"lang": "en",
"time": "2026-03-19T09:46:00.000Z",
"value": "Independent report received from Markus Magnuson"
},
{
"lang": "en",
"time": "2026-03-21T11:13:00.000Z",
"value": "Independent report received from Haruki Oyama"
},
{
"lang": "en",
"time": "2026-03-24T19:46:00.000Z",
"value": "Fix shared publicly by Piotr P. Karwasz as pull request #4075"
},
{
"lang": "en",
"time": "2026-03-28T11:19:00.000Z",
"value": "Log4j 2.25.4 released"
}
],
"title": "Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2026-34477",
"datePublished": "2026-04-10T15:36:19.740Z",
"dateReserved": "2026-03-28T11:26:04.052Z",
"dateUpdated": "2026-04-10T17:38:57.154Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-34477",
"date": "2026-05-19",
"epss": "0.00119",
"percentile": "0.30313"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-34477\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2026-04-10T16:16:30.843\",\"lastModified\":\"2026-05-06T16:49:51.080\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\\n\\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\\n\\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\\n\\n * An SMTP, Socket, or Syslog appender is in use.\\n * TLS is configured via a nested \u003cSsl\u003e element.\\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\\n\\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"LOW\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-297\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.12.0\",\"versionEndExcluding\":\"2.25.4\",\"matchCriteriaId\":\"2C60BA8E-5300-45BD-AB82-2B8AD28917CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE518C3-2F43-40FF-B754-C340B7003FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2A01C1-D56C-4198-8ADB-11739F791E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F8BD61-DD30-4D64-842C-850E5B117036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED00C38D-27EA-489C-9A2B-3594ACA8A3C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8794D719-1D90-4378-B48B-698EA40FBFB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C9FCBD-ECAD-4C29-B97A-2B9D97C0FC1F\"}]}]}],\"references\":[{\"url\":\"https://github.com/apache/logging-log4j2/pull/4075\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.apache.org/thread/lkx8cl46t2bvkcwfcb2pd43ygc097lq4\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://logging.apache.org/cyclonedx/vdr.xml\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName\",\"source\":\"security@apache.org\",\"tags\":[\"Product\"]},{\"url\":\"https://logging.apache.org/security.html#CVE-2026-34477\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-34477\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-10T17:36:46.652477Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-10T17:38:37.230Z\"}}], \"cna\": {\"title\": \"Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Samuli Leinonen (original reporter)\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Naresh Kandula (independently)\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Vitaly Simonovich (independently)\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Raijuna (independently)\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Danish Siddiqui (djvirus, independently)\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Markus Magnuson (independently)\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Haruki Oyama (Waseda University, independently)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"LOW\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"moderate\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*\"], \"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Log4j Core\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.12.0\", \"lessThan\": \"2.25.4\", \"versionType\": \"maven\"}, {\"status\": \"affected\", \"version\": \"3.0.0-alpha1\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"3.0.0-beta3\"}], \"packageURL\": \"pkg:maven/org.apache.logging.log4j/log4j-core\", \"packageName\": \"org.apache.logging.log4j:log4j-core\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-12-20T19:05:00.000Z\", \"value\": \"Vulnerability reported by Samuli Leinonen\"}, {\"lang\": \"en\", \"time\": \"2025-12-30T22:57:00.000Z\", \"value\": \"Candidate patch shared internally by Piotr P. Karwasz\"}, {\"lang\": \"en\", \"time\": \"2026-02-25T19:35:00.000Z\", \"value\": \"Independent report received from Naresh Kandula\"}, {\"lang\": \"en\", \"time\": \"2026-03-01T23:01:00.000Z\", \"value\": \"Independent report received from Vitaly Simonovich\"}, {\"lang\": \"en\", \"time\": \"2026-03-02T06:31:00.000Z\", \"value\": \"Independent report received from Raijuna\"}, {\"lang\": \"en\", \"time\": \"2026-03-08T18:17:00.000Z\", \"value\": \"Independent report received from Danish Siddiqui\"}, {\"lang\": \"en\", \"time\": \"2026-03-19T09:46:00.000Z\", \"value\": \"Independent report received from Markus Magnuson\"}, {\"lang\": \"en\", \"time\": \"2026-03-21T11:13:00.000Z\", \"value\": \"Independent report received from Haruki Oyama\"}, {\"lang\": \"en\", \"time\": \"2026-03-24T19:46:00.000Z\", \"value\": \"Fix shared publicly by Piotr P. Karwasz as pull request #4075\"}, {\"lang\": \"en\", \"time\": \"2026-03-28T11:19:00.000Z\", \"value\": \"Log4j 2.25.4 released\"}], \"references\": [{\"url\": \"https://github.com/apache/logging-log4j2/pull/4075\", \"tags\": [\"patch\"]}, {\"url\": \"https://logging.apache.org/security.html#CVE-2026-34477\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://logging.apache.org/cyclonedx/vdr.xml\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName\", \"tags\": [\"related\"]}, {\"url\": \"https://lists.apache.org/thread/lkx8cl46t2bvkcwfcb2pd43ygc097lq4\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\\n\\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\\n\\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\\n\\n * An SMTP, Socket, or Syslog appender is in use.\\n * TLS is configured via a nested \u003cSsl\u003e element.\\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\\n\\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe fix for \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://logging.apache.org/security.html#CVE-2025-68161\\\"\u003eCVE-2025-68161\u003c/a\u003e was incomplete: it addressed hostname verification only when enabled via the \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName\\\"\u003e\u003ccode\u003elog4j2.sslVerifyHostName\u003c/code\u003e\u003c/a\u003e system property, but not when configured through the \u003ccode\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName\\\"\u003everifyHostName\u003c/a\u003e\u003c/code\u003e attribute of the \u003ccode\u003e\u0026lt;Ssl\u0026gt;\u003c/code\u003e element.\u003c/p\u003e\u003cp\u003eAlthough the \u003ccode\u003everifyHostName\u003c/code\u003e configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\u003c/p\u003e\u003cp\u003eA network-based attacker may be able to perform a man-in-the-middle attack when \u003cstrong\u003eall\u003c/strong\u003e of the following conditions are met:\u003c/p\u003e\u003col\u003e\u003cli\u003eAn SMTP, Socket, or Syslog appender is in use.\u003c/li\u003e\u003cli\u003eTLS is configured via a nested \u003ccode\u003e\u0026lt;Ssl\u0026gt;\u003c/code\u003e element.\u003c/li\u003e\u003cli\u003eThe attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eThis issue does not affect users of the HTTP appender, which uses a separate \u003ccode\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName\\\"\u003everifyHostname\u003c/a\u003e\u003c/code\u003e attribute that was not subject to this bug and verifies host names by default.\u003c/p\u003e\u003cp\u003eUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-297\", \"description\": \"CWE-297 Improper Validation of Certificate with Host Mismatch\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2026-04-10T15:36:19.740Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-34477\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-10T17:38:57.154Z\", \"dateReserved\": \"2026-03-28T11:26:04.052Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2026-04-10T15:36:19.740Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-34477
Vulnerability from fkie_nvd - Published: 2026-04-10 16:16 - Updated: 2026-05-06 16:49{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60BA8E-5300-45BD-AB82-2B8AD28917CD",
"versionEndExcluding": "2.25.4",
"versionStartIncluding": "2.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "5EE518C3-2F43-40FF-B754-C340B7003FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc1:*:*:*:*:*:*",
"matchCriteriaId": "6D2A01C1-D56C-4198-8ADB-11739F791E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc2:*:*:*:*:*:*",
"matchCriteriaId": "D6F8BD61-DD30-4D64-842C-850E5B117036",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "ED00C38D-27EA-489C-9A2B-3594ACA8A3C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8794D719-1D90-4378-B48B-698EA40FBFB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "74C9FCBD-ECAD-4C29-B97A-2B9D97C0FC1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\n\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\n\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\n\n * An SMTP, Socket, or Syslog appender is in use.\n * TLS is configured via a nested \u003cSsl\u003e element.\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue."
}
],
"id": "CVE-2026-34477",
"lastModified": "2026-05-06T16:49:51.080",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@apache.org",
"type": "Secondary"
}
]
},
"published": "2026-04-10T16:16:30.843",
"references": [
{
"source": "security@apache.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/apache/logging-log4j2/pull/4075"
},
{
"source": "security@apache.org",
"tags": [
"Mailing List"
],
"url": "https://lists.apache.org/thread/lkx8cl46t2bvkcwfcb2pd43ygc097lq4"
},
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://logging.apache.org/cyclonedx/vdr.xml"
},
{
"source": "security@apache.org",
"tags": [
"Product"
],
"url": "https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName"
},
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://logging.apache.org/security.html#CVE-2026-34477"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-297"
}
],
"source": "security@apache.org",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-6HG6-V5C8-FPHQ
Vulnerability from github – Published: 2026-04-10 18:31 – Updated: 2026-04-14 00:11The fix for CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName attribute of the <Ssl> element.
Although the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.
A network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:
- An SMTP, Socket, or Syslog appender is in use.
- TLS is configured via a nested element.
- The attacker can present a certificate issued by a CA trusted by the appender's configured trust store, or by the default Java trust store if none is configured.
This issue does not affect users of the HTTP appender, which uses a separate verifyHostname attribute that was not subject to this bug and verifies host names by default.
Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.logging.log4j:log4j-core"
},
"ranges": [
{
"events": [
{
"introduced": "2.12.0"
},
{
"fixed": "2.25.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.logging.log4j:log4j-core"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0-alpha1"
},
{
"last_affected": "3.0.0-beta3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-34477"
],
"database_specific": {
"cwe_ids": [
"CWE-297"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-14T00:11:55Z",
"nvd_published_at": "2026-04-10T16:16:30Z",
"severity": "MODERATE"
},
"details": "The fix for CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the [`log4j2.sslVerifyHostName`](https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName) system property, but not when configured through the [`verifyHostName`](https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName) attribute of the `\u003cSsl\u003e` element.\n\nAlthough the `verifyHostName` configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\n\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\n\n * An SMTP, Socket, or Syslog appender is in use.\n * TLS is configured via a nested \u003cSsl\u003e element.\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\n\nThis issue does not affect users of the HTTP appender, which uses a separate [`verifyHostname`](https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName) attribute that was not subject to this bug and verifies host names by default.\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.",
"id": "GHSA-6hg6-v5c8-fphq",
"modified": "2026-04-14T00:11:55Z",
"published": "2026-04-10T18:31:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34477"
},
{
"type": "WEB",
"url": "https://github.com/apache/logging-log4j2/pull/4075"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/logging-log4j2"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/lkx8cl46t2bvkcwfcb2pd43ygc097lq4"
},
{
"type": "WEB",
"url": "https://logging.apache.org/cyclonedx/vdr.xml"
},
{
"type": "WEB",
"url": "https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName"
},
{
"type": "WEB",
"url": "https://logging.apache.org/security.html#CVE-2026-34477"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Apache Log4j Core: `verifyHostName` attribute silently ignored in TLS configuration"
}
MSRC_CVE-2026-34477
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-04-30 01:53| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-1 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-34477 Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-34477.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass",
"tracking": {
"current_release_date": "2026-04-30T01:53:25.000Z",
"generator": {
"date": "2026-04-30T08:42:48.208Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-34477",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-13T01:09:45.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-13T14:41:08.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-04-30T01:53:25.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "azl3 javapackages-bootstrap 0:1.14.0-4.azl3",
"product": {
"name": "azl3 javapackages-bootstrap 0:1.14.0-4.azl3",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 javapackages-bootstrap 0:1.14.0-4.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34477",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "apache",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-34477 Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-34477.json"
}
],
"title": "Apache Log4j Core: verifyHostName attribute silently ignored in TLS configuration, allowing hostname verification bypass"
}
]
}
OPENSUSE-SU-2026:10544-1
Vulnerability from csaf_opensuse - Published: 2026-04-14 00:00 - Updated: 2026-04-14 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "log4j-2.20.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the log4j-2.20.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10544",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10544-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34477 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34479 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34480 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34481 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34481/"
}
],
"title": "log4j-2.20.0-2.1 on GA media",
"tracking": {
"current_release_date": "2026-04-14T00:00:00Z",
"generator": {
"date": "2026-04-14T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10544-1",
"initial_release_date": "2026-04-14T00:00:00Z",
"revision_history": [
{
"date": "2026-04-14T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-2.20.0-2.1.aarch64",
"product_id": "log4j-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-bom-2.20.0-2.1.aarch64",
"product_id": "log4j-bom-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.aarch64",
"product_id": "log4j-javadoc-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-jcl-2.20.0-2.1.aarch64",
"product_id": "log4j-jcl-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.aarch64",
"product_id": "log4j-jmx-gui-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-nosql-2.20.0-2.1.aarch64",
"product_id": "log4j-nosql-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.aarch64",
"product_id": "log4j-slf4j-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-taglib-2.20.0-2.1.aarch64",
"product_id": "log4j-taglib-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-web-2.20.0-2.1.aarch64",
"product_id": "log4j-web-2.20.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-2.20.0-2.1.ppc64le",
"product_id": "log4j-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-bom-2.20.0-2.1.ppc64le",
"product_id": "log4j-bom-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.ppc64le",
"product_id": "log4j-javadoc-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-jcl-2.20.0-2.1.ppc64le",
"product_id": "log4j-jcl-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.ppc64le",
"product_id": "log4j-jmx-gui-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-nosql-2.20.0-2.1.ppc64le",
"product_id": "log4j-nosql-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.ppc64le",
"product_id": "log4j-slf4j-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-taglib-2.20.0-2.1.ppc64le",
"product_id": "log4j-taglib-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-web-2.20.0-2.1.ppc64le",
"product_id": "log4j-web-2.20.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.s390x",
"product": {
"name": "log4j-2.20.0-2.1.s390x",
"product_id": "log4j-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.s390x",
"product": {
"name": "log4j-bom-2.20.0-2.1.s390x",
"product_id": "log4j-bom-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.s390x",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.s390x",
"product_id": "log4j-javadoc-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.s390x",
"product": {
"name": "log4j-jcl-2.20.0-2.1.s390x",
"product_id": "log4j-jcl-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.s390x",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.s390x",
"product_id": "log4j-jmx-gui-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.s390x",
"product": {
"name": "log4j-nosql-2.20.0-2.1.s390x",
"product_id": "log4j-nosql-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.s390x",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.s390x",
"product_id": "log4j-slf4j-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.s390x",
"product": {
"name": "log4j-taglib-2.20.0-2.1.s390x",
"product_id": "log4j-taglib-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.s390x",
"product": {
"name": "log4j-web-2.20.0-2.1.s390x",
"product_id": "log4j-web-2.20.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-2.20.0-2.1.x86_64",
"product_id": "log4j-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-bom-2.20.0-2.1.x86_64",
"product_id": "log4j-bom-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.x86_64",
"product_id": "log4j-javadoc-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-jcl-2.20.0-2.1.x86_64",
"product_id": "log4j-jcl-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.x86_64",
"product_id": "log4j-jmx-gui-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-nosql-2.20.0-2.1.x86_64",
"product_id": "log4j-nosql-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.x86_64",
"product_id": "log4j-slf4j-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-taglib-2.20.0-2.1.x86_64",
"product_id": "log4j-taglib-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-web-2.20.0-2.1.x86_64",
"product_id": "log4j-web-2.20.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x"
},
"product_reference": "log4j-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-bom-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-bom-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x"
},
"product_reference": "log4j-bom-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-bom-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-jcl-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-jcl-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x"
},
"product_reference": "log4j-jcl-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-jcl-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-nosql-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-nosql-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x"
},
"product_reference": "log4j-nosql-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-nosql-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-taglib-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-taglib-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x"
},
"product_reference": "log4j-taglib-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-taglib-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-web-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-web-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x"
},
"product_reference": "log4j-web-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-web-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34477"
}
],
"notes": [
{
"category": "general",
"text": "The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\n\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\n\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\n\n * An SMTP, Socket, or Syslog appender is in use.\n * TLS is configured via a nested \u003cSsl\u003e element.\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34477",
"url": "https://www.suse.com/security/cve/CVE-2026-34477"
},
{
"category": "external",
"summary": "SUSE Bug 1262050 for CVE-2026-34477",
"url": "https://bugzilla.suse.com/1262050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34477"
},
{
"cve": "CVE-2026-34479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34479"
}
],
"notes": [
{
"category": "general",
"text": "The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\n\nTwo groups of users are affected:\n\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\n\n\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\n\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34479",
"url": "https://www.suse.com/security/cve/CVE-2026-34479"
},
{
"category": "external",
"summary": "SUSE Bug 1262091 for CVE-2026-34479",
"url": "https://bugzilla.suse.com/1262091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34479"
},
{
"cve": "CVE-2026-34480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34480"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j Core\u0027s XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value contains such characters.\n\nThe impact depends on the StAX implementation in use:\n\n * JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records.\n * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j\u0027s internal status logger.\n\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34480",
"url": "https://www.suse.com/security/cve/CVE-2026-34480"
},
{
"category": "external",
"summary": "SUSE Bug 1262092 for CVE-2026-34480",
"url": "https://bugzilla.suse.com/1262092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34480"
},
{
"cve": "CVE-2026-34481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34481"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j\u0027s JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records.\n\nAn attacker can exploit this issue only if both of the following conditions are met:\n\n * The application uses JsonTemplateLayout.\n * The application logs a MapMessage containing an attacker-controlled floating-point value.\n\n\nUsers are advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34481",
"url": "https://www.suse.com/security/cve/CVE-2026-34481"
},
{
"category": "external",
"summary": "SUSE Bug 1262093 for CVE-2026-34481",
"url": "https://bugzilla.suse.com/1262093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34481"
}
]
}
SUSE-SU-2026:1843-1
Vulnerability from csaf_suse - Published: 2026-05-13 15:24 - Updated: 2026-05-13 15:24| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for log4j",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for log4j fixes the following issues:\n\n- CVE-2026-34477: TLS connections vulnerable to interception due to incomplete hostname verification configuration\n checks (bsc#1262050).\n- CVE-2026-34479: silent log event loss due to improper XML escaping in `Log4j1XmlLayout` (bsc#1262091).\n- CVE-2026-34480: silent log event loss due to improper XML escaping in `XmlLayout` (bsc#1262092).\n- CVE-2026-34481: silent log event loss due to improper serialization of non-finite floating-point values in\n `JsonTemplateLayout` (bsc#1262093).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1843,SUSE-SLE-Module-Basesystem-15-SP7-2026-1843",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1843-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1843-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261843-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1843-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046426.html"
},
{
"category": "self",
"summary": "SUSE Bug 1262050",
"url": "https://bugzilla.suse.com/1262050"
},
{
"category": "self",
"summary": "SUSE Bug 1262091",
"url": "https://bugzilla.suse.com/1262091"
},
{
"category": "self",
"summary": "SUSE Bug 1262092",
"url": "https://bugzilla.suse.com/1262092"
},
{
"category": "self",
"summary": "SUSE Bug 1262093",
"url": "https://bugzilla.suse.com/1262093"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34477 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34479 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34480 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34481 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34481/"
}
],
"title": "Security update for log4j",
"tracking": {
"current_release_date": "2026-05-13T15:24:57Z",
"generator": {
"date": "2026-05-13T15:24:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1843-1",
"initial_release_date": "2026-05-13T15:24:57Z",
"revision_history": [
{
"date": "2026-05-13T15:24:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-bom-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-bom-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-javadoc-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-jcl-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-jcl-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-slf4j-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-slf4j-2.20.0-150200.4.33.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-jcl-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-slf4j-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34477"
}
],
"notes": [
{
"category": "general",
"text": "The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\n\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\n\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\n\n * An SMTP, Socket, or Syslog appender is in use.\n * TLS is configured via a nested \u003cSsl\u003e element.\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34477",
"url": "https://www.suse.com/security/cve/CVE-2026-34477"
},
{
"category": "external",
"summary": "SUSE Bug 1262050 for CVE-2026-34477",
"url": "https://bugzilla.suse.com/1262050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34477"
},
{
"cve": "CVE-2026-34479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34479"
}
],
"notes": [
{
"category": "general",
"text": "The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\n\nTwo groups of users are affected:\n\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\n\n\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\n\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34479",
"url": "https://www.suse.com/security/cve/CVE-2026-34479"
},
{
"category": "external",
"summary": "SUSE Bug 1262091 for CVE-2026-34479",
"url": "https://bugzilla.suse.com/1262091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34479"
},
{
"cve": "CVE-2026-34480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34480"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j Core\u0027s XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value contains such characters.\n\nThe impact depends on the StAX implementation in use:\n\n * JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records.\n * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j\u0027s internal status logger.\n\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34480",
"url": "https://www.suse.com/security/cve/CVE-2026-34480"
},
{
"category": "external",
"summary": "SUSE Bug 1262092 for CVE-2026-34480",
"url": "https://bugzilla.suse.com/1262092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34480"
},
{
"cve": "CVE-2026-34481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34481"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j\u0027s JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records.\n\nAn attacker can exploit this issue only if both of the following conditions are met:\n\n * The application uses JsonTemplateLayout.\n * The application logs a MapMessage containing an attacker-controlled floating-point value.\n\n\nUsers are advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34481",
"url": "https://www.suse.com/security/cve/CVE-2026-34481"
},
{
"category": "external",
"summary": "SUSE Bug 1262093 for CVE-2026-34481",
"url": "https://bugzilla.suse.com/1262093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34481"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.