Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-34479 (GCVE-0-2026-34479)
Vulnerability from cvelistv5 – Published: 2026-04-10 15:41 – Updated: 2026-04-10 17:47- CWE-116 - Improper Encoding or Escaping of Output
| URL | Tags |
|---|---|
| https://github.com/apache/logging-log4j2/pull/4078 | patch |
| https://logging.apache.org/security.html#CVE-2026-34479 | vendor-advisory |
| https://logging.apache.org/cyclonedx/vdr.xml | vendor-advisory |
| https://logging.apache.org/log4j/2.x/migrate-from… | related |
| https://lists.apache.org/thread/gd0hp6mj17rn3kj27… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Apache Software Foundation | Apache Log4j 1 to Log4j 2 bridge |
Affected:
2.7 , < 2.25.4
(maven)
Affected: 3.0.0-alpha1 , ≤ 3.0.0-beta2 (maven) cpe:2.3:a:apache:log4j_1_2_api:*:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-04-10T16:18:18.699Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/10/8"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-34479",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-10T17:45:24.466114Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-10T17:47:34.402Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"cpes": [
"cpe:2.3:a:apache:log4j_1_2_api:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"packageName": "org.apache.logging.log4j:log4j-1.2-api",
"packageURL": "pkg:maven/org.apache.logging.log4j/log4j-1.2-api",
"product": "Apache Log4j 1 to Log4j 2 bridge",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "2.25.4",
"status": "affected",
"version": "2.7",
"versionType": "maven"
},
{
"lessThanOrEqual": "3.0.0-beta2",
"status": "affected",
"version": "3.0.0-alpha1",
"versionType": "maven"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ap4sh (Samy Medjahed) and Ethicxz (Eliott Laurie) (original reporters)"
},
{
"lang": "en",
"type": "finder",
"value": "jabaltarik1 (independently)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThe \u003ccode\u003eLog4j1XmlLayout\u003c/code\u003e from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\u003c/p\u003e\u003cp\u003eTwo groups of users are affected:\u003c/p\u003e\u003cul\u003e\u003cli\u003eThose using \u003ccode\u003eLog4j1XmlLayout\u003c/code\u003e directly in a Log4j Core 2 configuration file.\u003c/li\u003e\u003cli\u003eThose using the Log4j 1 configuration compatibility layer with \u003ccode\u003eorg.apache.log4j.xml.XMLLayout\u003c/code\u003e specified as the layout class.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eNote:\u003c/strong\u003e The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html\"\u003eLog4j 1 to Log4j 2 migration guide\u003c/a\u003e, and specifically the section on eliminating reliance on the bridge.\u003c/p\u003e"
}
],
"value": "The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\n\nTwo groups of users are affected:\n\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\n\n\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\n\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"other": {
"content": {
"text": "moderate"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-116",
"description": "CWE-116 Improper Encoding or Escaping of Output",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-10T15:41:07.888Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://github.com/apache/logging-log4j2/pull/4078"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://logging.apache.org/security.html#CVE-2026-34479"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://logging.apache.org/cyclonedx/vdr.xml"
},
{
"tags": [
"related"
],
"url": "https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://lists.apache.org/thread/gd0hp6mj17rn3kj279vgy4p7kd4zz5on"
}
],
"source": {
"discovery": "EXTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-02-16T17:11:00.000Z",
"value": "Vulnerability reported by Ap4sh and ethicxz"
},
{
"lang": "en",
"time": "2026-03-15T05:39:00.000Z",
"value": "Independent report received from jabaltarik1"
},
{
"lang": "en",
"time": "2026-03-24T18:56:00.000Z",
"value": "Fix shared publicly by Piotr P. Karwasz as pull request #4078"
},
{
"lang": "en",
"time": "2026-03-25T09:46:00.000Z",
"value": "Fix verified by reporter"
},
{
"lang": "en",
"time": "2026-03-28T11:19:00.000Z",
"value": "Log4j 2.25.4 released"
}
],
"title": "Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2026-34479",
"datePublished": "2026-04-10T15:41:07.888Z",
"dateReserved": "2026-03-28T14:06:31.965Z",
"dateUpdated": "2026-04-10T17:47:34.402Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-34479",
"date": "2026-05-22",
"epss": "0.00126",
"percentile": "0.31294"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-34479\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2026-04-10T16:16:31.270\",\"lastModified\":\"2026-05-06T18:21:34.373\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\\n\\nTwo groups of users are affected:\\n\\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\\n\\n\\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\\n\\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"LOW\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-116\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7\",\"versionEndExcluding\":\"2.25.4\",\"matchCriteriaId\":\"4D7C1729-01D6-4981-B3FB-3A877083AE28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE518C3-2F43-40FF-B754-C340B7003FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D2A01C1-D56C-4198-8ADB-11739F791E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F8BD61-DD30-4D64-842C-850E5B117036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED00C38D-27EA-489C-9A2B-3594ACA8A3C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:log4j:3.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8794D719-1D90-4378-B48B-698EA40FBFB2\"}]}]}],\"references\":[{\"url\":\"https://github.com/apache/logging-log4j2/pull/4078\",\"source\":\"security@apache.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.apache.org/thread/gd0hp6mj17rn3kj279vgy4p7kd4zz5on\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://logging.apache.org/cyclonedx/vdr.xml\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mitigation\"]},{\"url\":\"https://logging.apache.org/security.html#CVE-2026-34479\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/10/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/04/10/8\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-04-10T16:18:18.699Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-34479\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-10T17:45:24.466114Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-10T17:47:19.925Z\"}}], \"cna\": {\"title\": \"Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Ap4sh (Samy Medjahed) and Ethicxz (Eliott Laurie) (original reporters)\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"jabaltarik1 (independently)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6.9, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"LOW\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"moderate\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:apache:log4j_1_2_api:*:*:*:*:*:*:*:*\"], \"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Log4j 1 to Log4j 2 bridge\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.7\", \"lessThan\": \"2.25.4\", \"versionType\": \"maven\"}, {\"status\": \"affected\", \"version\": \"3.0.0-alpha1\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"3.0.0-beta2\"}], \"packageURL\": \"pkg:maven/org.apache.logging.log4j/log4j-1.2-api\", \"packageName\": \"org.apache.logging.log4j:log4j-1.2-api\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-02-16T17:11:00.000Z\", \"value\": \"Vulnerability reported by Ap4sh and ethicxz\"}, {\"lang\": \"en\", \"time\": \"2026-03-15T05:39:00.000Z\", \"value\": \"Independent report received from jabaltarik1\"}, {\"lang\": \"en\", \"time\": \"2026-03-24T18:56:00.000Z\", \"value\": \"Fix shared publicly by Piotr P. Karwasz as pull request #4078\"}, {\"lang\": \"en\", \"time\": \"2026-03-25T09:46:00.000Z\", \"value\": \"Fix verified by reporter\"}, {\"lang\": \"en\", \"time\": \"2026-03-28T11:19:00.000Z\", \"value\": \"Log4j 2.25.4 released\"}], \"references\": [{\"url\": \"https://github.com/apache/logging-log4j2/pull/4078\", \"tags\": [\"patch\"]}, {\"url\": \"https://logging.apache.org/security.html#CVE-2026-34479\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://logging.apache.org/cyclonedx/vdr.xml\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html\", \"tags\": [\"related\"]}, {\"url\": \"https://lists.apache.org/thread/gd0hp6mj17rn3kj279vgy4p7kd4zz5on\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\\n\\nTwo groups of users are affected:\\n\\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\\n\\n\\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\\n\\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThe \u003ccode\u003eLog4j1XmlLayout\u003c/code\u003e from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\u003c/p\u003e\u003cp\u003eTwo groups of users are affected:\u003c/p\u003e\u003cul\u003e\u003cli\u003eThose using \u003ccode\u003eLog4j1XmlLayout\u003c/code\u003e directly in a Log4j Core 2 configuration file.\u003c/li\u003e\u003cli\u003eThose using the Log4j 1 configuration compatibility layer with \u003ccode\u003eorg.apache.log4j.xml.XMLLayout\u003c/code\u003e specified as the layout class.\u003c/li\u003e\u003c/ul\u003e\u003cp\u003eUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eNote:\u003c/strong\u003e The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html\\\"\u003eLog4j 1 to Log4j 2 migration guide\u003c/a\u003e, and specifically the section on eliminating reliance on the bridge.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-116\", \"description\": \"CWE-116 Improper Encoding or Escaping of Output\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2026-04-10T15:41:07.888Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-34479\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-10T17:47:34.402Z\", \"dateReserved\": \"2026-03-28T14:06:31.965Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2026-04-10T15:41:07.888Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-34479
Vulnerability from fkie_nvd - Published: 2026-04-10 16:16 - Updated: 2026-05-06 18:21{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7C1729-01D6-4981-B3FB-3A877083AE28",
"versionEndExcluding": "2.25.4",
"versionStartIncluding": "2.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "5EE518C3-2F43-40FF-B754-C340B7003FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc1:*:*:*:*:*:*",
"matchCriteriaId": "6D2A01C1-D56C-4198-8ADB-11739F791E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:alpha1_rc2:*:*:*:*:*:*",
"matchCriteriaId": "D6F8BD61-DD30-4D64-842C-850E5B117036",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "ED00C38D-27EA-489C-9A2B-3594ACA8A3C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:log4j:3.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "8794D719-1D90-4378-B48B-698EA40FBFB2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\n\nTwo groups of users are affected:\n\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\n\n\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\n\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge."
}
],
"id": "CVE-2026-34479",
"lastModified": "2026-05-06T18:21:34.373",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security@apache.org",
"type": "Secondary"
}
]
},
"published": "2026-04-10T16:16:31.270",
"references": [
{
"source": "security@apache.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/apache/logging-log4j2/pull/4078"
},
{
"source": "security@apache.org",
"tags": [
"Mailing List"
],
"url": "https://lists.apache.org/thread/gd0hp6mj17rn3kj279vgy4p7kd4zz5on"
},
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://logging.apache.org/cyclonedx/vdr.xml"
},
{
"source": "security@apache.org",
"tags": [
"Mitigation"
],
"url": "https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html"
},
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://logging.apache.org/security.html#CVE-2026-34479"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2026/04/10/8"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-116"
}
],
"source": "security@apache.org",
"type": "Secondary"
}
]
}
GHSA-H383-GMXW-35V2
Vulnerability from github – Published: 2026-04-10 18:31 – Updated: 2026-04-14 00:10The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.
Two groups of users are affected:
- Those using
Log4j1XmlLayoutdirectly in a Log4j Core 2 configuration file. - Those using the Log4j 1 configuration compatibility layer with
org.apache.log4j.xml.XMLLayoutspecified as the layout class.
Users are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.
[!NOTE] The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide, and specifically the section on eliminating reliance on the bridge.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.logging.log4j:log4j-1.2-api"
},
"ranges": [
{
"events": [
{
"introduced": "2.7"
},
{
"fixed": "2.25.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.logging.log4j:log4j-1.2-api"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0-beta1"
},
{
"last_affected": "3.0.0-beta2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-34479"
],
"database_specific": {
"cwe_ids": [
"CWE-116"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-14T00:10:59Z",
"nvd_published_at": "2026-04-10T16:16:31Z",
"severity": "MODERATE"
},
"details": "The `Log4j1XmlLayout` from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\n\nTwo groups of users are affected:\n\n* Those using `Log4j1XmlLayout` directly in a Log4j Core 2 configuration file.\n* Those using the Log4j 1 configuration compatibility layer with `org.apache.log4j.xml.XMLLayout` specified as the layout class.\n\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version `2.25.4`, which corrects this issue.\n\n\u003e [!NOTE]\n\u003e The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the\n\u003e [Log4j 1 to Log4j 2 migration guide](https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html), and specifically the section on eliminating reliance on the bridge.",
"id": "GHSA-h383-gmxw-35v2",
"modified": "2026-04-14T00:10:59Z",
"published": "2026-04-10T18:31:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34479"
},
{
"type": "WEB",
"url": "https://github.com/apache/logging-log4j2/pull/4078"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/logging-log4j2"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/gd0hp6mj17rn3kj279vgy4p7kd4zz5on"
},
{
"type": "WEB",
"url": "https://logging.apache.org/cyclonedx/vdr.xml"
},
{
"type": "WEB",
"url": "https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html"
},
{
"type": "WEB",
"url": "https://logging.apache.org/security.html#CVE-2026-34479"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/10/8"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Apache Log4j 1 to Log4j 2 bridge: silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters"
}
MSRC_CVE-2026-34479
Vulnerability from csaf_microsoft - Published: 2026-04-02 00:00 - Updated: 2026-04-30 01:40| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-1 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-34479 Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-34479.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters",
"tracking": {
"current_release_date": "2026-04-30T01:40:38.000Z",
"generator": {
"date": "2026-04-30T08:42:48.220Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-34479",
"initial_release_date": "2026-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-15T01:05:18.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-17T14:39:42.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-04-30T01:40:38.000Z",
"legacy_version": "2",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "azl3 javapackages-bootstrap 0:1.14.0-4.azl3",
"product": {
"name": "azl3 javapackages-bootstrap 0:1.14.0-4.azl3",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 javapackages-bootstrap 0:1.14.0-4.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34479",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "apache",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-34479 Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-34479.json"
}
],
"title": "Apache Log4j 1 to Log4j 2 bridge: Silent log event loss in Log4j1XmlLayout due to unescaped XML 1.0 forbidden characters"
}
]
}
OPENSUSE-SU-2026:10544-1
Vulnerability from csaf_opensuse - Published: 2026-04-14 00:00 - Updated: 2026-04-14 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "log4j-2.20.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the log4j-2.20.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10544",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10544-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34477 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34479 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34480 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34481 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34481/"
}
],
"title": "log4j-2.20.0-2.1 on GA media",
"tracking": {
"current_release_date": "2026-04-14T00:00:00Z",
"generator": {
"date": "2026-04-14T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10544-1",
"initial_release_date": "2026-04-14T00:00:00Z",
"revision_history": [
{
"date": "2026-04-14T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-2.20.0-2.1.aarch64",
"product_id": "log4j-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-bom-2.20.0-2.1.aarch64",
"product_id": "log4j-bom-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.aarch64",
"product_id": "log4j-javadoc-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-jcl-2.20.0-2.1.aarch64",
"product_id": "log4j-jcl-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.aarch64",
"product_id": "log4j-jmx-gui-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-nosql-2.20.0-2.1.aarch64",
"product_id": "log4j-nosql-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.aarch64",
"product_id": "log4j-slf4j-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-taglib-2.20.0-2.1.aarch64",
"product_id": "log4j-taglib-2.20.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.aarch64",
"product": {
"name": "log4j-web-2.20.0-2.1.aarch64",
"product_id": "log4j-web-2.20.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-2.20.0-2.1.ppc64le",
"product_id": "log4j-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-bom-2.20.0-2.1.ppc64le",
"product_id": "log4j-bom-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.ppc64le",
"product_id": "log4j-javadoc-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-jcl-2.20.0-2.1.ppc64le",
"product_id": "log4j-jcl-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.ppc64le",
"product_id": "log4j-jmx-gui-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-nosql-2.20.0-2.1.ppc64le",
"product_id": "log4j-nosql-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.ppc64le",
"product_id": "log4j-slf4j-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-taglib-2.20.0-2.1.ppc64le",
"product_id": "log4j-taglib-2.20.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.ppc64le",
"product": {
"name": "log4j-web-2.20.0-2.1.ppc64le",
"product_id": "log4j-web-2.20.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.s390x",
"product": {
"name": "log4j-2.20.0-2.1.s390x",
"product_id": "log4j-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.s390x",
"product": {
"name": "log4j-bom-2.20.0-2.1.s390x",
"product_id": "log4j-bom-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.s390x",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.s390x",
"product_id": "log4j-javadoc-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.s390x",
"product": {
"name": "log4j-jcl-2.20.0-2.1.s390x",
"product_id": "log4j-jcl-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.s390x",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.s390x",
"product_id": "log4j-jmx-gui-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.s390x",
"product": {
"name": "log4j-nosql-2.20.0-2.1.s390x",
"product_id": "log4j-nosql-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.s390x",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.s390x",
"product_id": "log4j-slf4j-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.s390x",
"product": {
"name": "log4j-taglib-2.20.0-2.1.s390x",
"product_id": "log4j-taglib-2.20.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.s390x",
"product": {
"name": "log4j-web-2.20.0-2.1.s390x",
"product_id": "log4j-web-2.20.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-2.20.0-2.1.x86_64",
"product_id": "log4j-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-bom-2.20.0-2.1.x86_64",
"product_id": "log4j-bom-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-javadoc-2.20.0-2.1.x86_64",
"product_id": "log4j-javadoc-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-jcl-2.20.0-2.1.x86_64",
"product_id": "log4j-jcl-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-jmx-gui-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-jmx-gui-2.20.0-2.1.x86_64",
"product_id": "log4j-jmx-gui-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-nosql-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-nosql-2.20.0-2.1.x86_64",
"product_id": "log4j-nosql-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-slf4j-2.20.0-2.1.x86_64",
"product_id": "log4j-slf4j-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-taglib-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-taglib-2.20.0-2.1.x86_64",
"product_id": "log4j-taglib-2.20.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "log4j-web-2.20.0-2.1.x86_64",
"product": {
"name": "log4j-web-2.20.0-2.1.x86_64",
"product_id": "log4j-web-2.20.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x"
},
"product_reference": "log4j-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-bom-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-bom-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x"
},
"product_reference": "log4j-bom-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-bom-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-bom-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-javadoc-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-jcl-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-jcl-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x"
},
"product_reference": "log4j-jcl-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-jcl-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jmx-gui-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-jmx-gui-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-nosql-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-nosql-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x"
},
"product_reference": "log4j-nosql-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-nosql-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-nosql-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-slf4j-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-taglib-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-taglib-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x"
},
"product_reference": "log4j-taglib-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-taglib-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-taglib-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64"
},
"product_reference": "log4j-web-2.20.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le"
},
"product_reference": "log4j-web-2.20.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x"
},
"product_reference": "log4j-web-2.20.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-web-2.20.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
},
"product_reference": "log4j-web-2.20.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34477"
}
],
"notes": [
{
"category": "general",
"text": "The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\n\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\n\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\n\n * An SMTP, Socket, or Syslog appender is in use.\n * TLS is configured via a nested \u003cSsl\u003e element.\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34477",
"url": "https://www.suse.com/security/cve/CVE-2026-34477"
},
{
"category": "external",
"summary": "SUSE Bug 1262050 for CVE-2026-34477",
"url": "https://bugzilla.suse.com/1262050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34477"
},
{
"cve": "CVE-2026-34479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34479"
}
],
"notes": [
{
"category": "general",
"text": "The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\n\nTwo groups of users are affected:\n\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\n\n\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\n\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34479",
"url": "https://www.suse.com/security/cve/CVE-2026-34479"
},
{
"category": "external",
"summary": "SUSE Bug 1262091 for CVE-2026-34479",
"url": "https://bugzilla.suse.com/1262091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34479"
},
{
"cve": "CVE-2026-34480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34480"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j Core\u0027s XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value contains such characters.\n\nThe impact depends on the StAX implementation in use:\n\n * JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records.\n * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j\u0027s internal status logger.\n\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34480",
"url": "https://www.suse.com/security/cve/CVE-2026-34480"
},
{
"category": "external",
"summary": "SUSE Bug 1262092 for CVE-2026-34480",
"url": "https://bugzilla.suse.com/1262092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34480"
},
{
"cve": "CVE-2026-34481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34481"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j\u0027s JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records.\n\nAn attacker can exploit this issue only if both of the following conditions are met:\n\n * The application uses JsonTemplateLayout.\n * The application logs a MapMessage containing an attacker-controlled floating-point value.\n\n\nUsers are advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34481",
"url": "https://www.suse.com/security/cve/CVE-2026-34481"
},
{
"category": "external",
"summary": "SUSE Bug 1262093 for CVE-2026-34481",
"url": "https://bugzilla.suse.com/1262093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:log4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-bom-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-javadoc-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jcl-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-jmx-gui-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-nosql-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-slf4j-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-taglib-2.20.0-2.1.x86_64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.aarch64",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.ppc64le",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.s390x",
"openSUSE Tumbleweed:log4j-web-2.20.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-14T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-34481"
}
]
}
SUSE-SU-2026:1843-1
Vulnerability from csaf_suse - Published: 2026-05-13 15:24 - Updated: 2026-05-13 15:24| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for log4j",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for log4j fixes the following issues:\n\n- CVE-2026-34477: TLS connections vulnerable to interception due to incomplete hostname verification configuration\n checks (bsc#1262050).\n- CVE-2026-34479: silent log event loss due to improper XML escaping in `Log4j1XmlLayout` (bsc#1262091).\n- CVE-2026-34480: silent log event loss due to improper XML escaping in `XmlLayout` (bsc#1262092).\n- CVE-2026-34481: silent log event loss due to improper serialization of non-finite floating-point values in\n `JsonTemplateLayout` (bsc#1262093).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1843,SUSE-SLE-Module-Basesystem-15-SP7-2026-1843",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1843-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1843-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261843-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1843-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046426.html"
},
{
"category": "self",
"summary": "SUSE Bug 1262050",
"url": "https://bugzilla.suse.com/1262050"
},
{
"category": "self",
"summary": "SUSE Bug 1262091",
"url": "https://bugzilla.suse.com/1262091"
},
{
"category": "self",
"summary": "SUSE Bug 1262092",
"url": "https://bugzilla.suse.com/1262092"
},
{
"category": "self",
"summary": "SUSE Bug 1262093",
"url": "https://bugzilla.suse.com/1262093"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34477 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34479 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34480 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-34481 page",
"url": "https://www.suse.com/security/cve/CVE-2026-34481/"
}
],
"title": "Security update for log4j",
"tracking": {
"current_release_date": "2026-05-13T15:24:57Z",
"generator": {
"date": "2026-05-13T15:24:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1843-1",
"initial_release_date": "2026-05-13T15:24:57Z",
"revision_history": [
{
"date": "2026-05-13T15:24:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "log4j-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-bom-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-bom-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-bom-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-javadoc-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-jcl-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-jcl-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-jcl-2.20.0-150200.4.33.1.noarch"
}
},
{
"category": "product_version",
"name": "log4j-slf4j-2.20.0-150200.4.33.1.noarch",
"product": {
"name": "log4j-slf4j-2.20.0-150200.4.33.1.noarch",
"product_id": "log4j-slf4j-2.20.0-150200.4.33.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-javadoc-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-jcl-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-jcl-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-slf4j-2.20.0-150200.4.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
},
"product_reference": "log4j-slf4j-2.20.0-150200.4.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-34477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34477"
}
],
"notes": [
{
"category": "general",
"text": "The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName attribute of the \u003cSsl\u003e element.\n\nAlthough the verifyHostName configuration attribute was introduced in Log4j Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving TLS connections vulnerable to interception regardless of the configured value.\n\nA network-based attacker may be able to perform a man-in-the-middle attack when all of the following conditions are met:\n\n * An SMTP, Socket, or Syslog appender is in use.\n * TLS is configured via a nested \u003cSsl\u003e element.\n * The attacker can present a certificate issued by a CA trusted by the appender\u0027s configured trust store, or by the default Java trust store if none is configured.\nThis issue does not affect users of the HTTP appender, which uses a separate verifyHostname https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName attribute that was not subject to this bug and verifies host names by default.\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34477",
"url": "https://www.suse.com/security/cve/CVE-2026-34477"
},
{
"category": "external",
"summary": "SUSE Bug 1262050 for CVE-2026-34477",
"url": "https://bugzilla.suse.com/1262050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34477"
},
{
"cve": "CVE-2026-34479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34479"
}
],
"notes": [
{
"category": "general",
"text": "The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records.\n\nTwo groups of users are affected:\n\n * Those using Log4j1XmlLayout directly in a Log4j Core 2 configuration file.\n * Those using the Log4j 1 configuration compatibility layer with org.apache.log4j.xml.XMLLayout specified as the layout class.\n\n\nUsers are advised to upgrade to Apache Log4j 1-to-Log4j 2 bridge version 2.25.4, which corrects this issue.\n\nNote: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be present in Log4j 3. Users are encouraged to consult the Log4j 1 to Log4j 2 migration guide https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html , and specifically the section on eliminating reliance on the bridge.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34479",
"url": "https://www.suse.com/security/cve/CVE-2026-34479"
},
{
"category": "external",
"summary": "SUSE Bug 1262091 for CVE-2026-34479",
"url": "https://bugzilla.suse.com/1262091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34479"
},
{
"cve": "CVE-2026-34480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34480"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j Core\u0027s XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value contains such characters.\n\nThe impact depends on the StAX implementation in use:\n\n * JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records.\n * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j\u0027s internal status logger.\n\n\nUsers are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34480",
"url": "https://www.suse.com/security/cve/CVE-2026-34480"
},
{
"category": "external",
"summary": "SUSE Bug 1262092 for CVE-2026-34480",
"url": "https://bugzilla.suse.com/1262092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34480"
},
{
"cve": "CVE-2026-34481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-34481"
}
],
"notes": [
{
"category": "general",
"text": "Apache Log4j\u0027s JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records.\n\nAn attacker can exploit this issue only if both of the following conditions are met:\n\n * The application uses JsonTemplateLayout.\n * The application logs a MapMessage containing an attacker-controlled floating-point value.\n\n\nUsers are advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-34481",
"url": "https://www.suse.com/security/cve/CVE-2026-34481"
},
{
"category": "external",
"summary": "SUSE Bug 1262093 for CVE-2026-34481",
"url": "https://bugzilla.suse.com/1262093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-javadoc-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-jcl-2.20.0-150200.4.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:log4j-slf4j-2.20.0-150200.4.33.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:24:57Z",
"details": "moderate"
}
],
"title": "CVE-2026-34481"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.