Source: log4cxx
Version: 1.4.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/apache/logging-log4cxx/pull/512
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 1.0.0-1
Control: found -1 0.11.0-2

Hi,

The following vulnerability was published for log4cxx.

CVE-2025-54813[0]:
| Improper Output Neutralization for Logs vulnerability in Apache
| Log4cxx.  When using JSONLayout, not all payload bytes are properly
| escaped. If an attacker-supplied message contains certain non-
| printable characters, these will be passed along in the message and
| written out as part of the JSON message. This may prevent
| applications that consume these logs from correctly interpreting the
| information within them.  This issue affects Apache Log4cxx: before
| 1.5.0.  Users are recommended to upgrade to version 1.5.0, which
| fixes the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-54813
    https://www.cve.org/CVERecord?id=CVE-2025-54813
[1] https://logging.apache.org/security.html#CVE-2025-54813
[2] https://github.com/apache/logging-log4cxx/pull/512
[3] 
https://github.com/apache/logging-log4cxx/commit/a799c934545311ff4179c68e16bbeb02b5c66348

Regards,
Salvatore

Reply via email to