Vulnerabilities unifi-controller booksonic-air fleet airsonic habridge nzbhydra2 davos booksonic ubooquity
At this time we have determined that all application/container updates or mitigations that we can reasonably provide have been actioned and as such are marking this issue as resolved.
Multiple vulnerabilities (CVE-2021-44228 and CVE-2021-45046) have been discovered in log4j which can lead to denial of service and remote code execution. The following Linuxserver containers have been confirmed not to be affected by CVE-2021-44228 or CVE-2021-45046 due to existing mitigations, upstream patches, or workarounds applied to the container images.
Please note these lists apply to the stated version tags and later only. If you are running older versions of the images they may still be vulnerable.
version-2.3.2and later (Workaround applied + upstream fix)
version-6.5.55and later (Workaround applied + upstream fix)
version-2.2.2and later (Upstream fix)
version-v2112.2.0and later (Upstream fix)
The following Linuxserver containers have been confirmed not to be affected by CVE-2021-44228 due to existing mitigations, upstream patches, or workarounds applied to the container images, but may still be vulnerable to CVE-2021-45046.
version-6.5.54and later (Workaround applied + upstream fix)
version-v2112.1.0and later (Upstream fix)
version-v3.18.4and later (Upstream fix)
The following Linuxserver containers are known to be using a vulnerable version of log4j in their current versions and cannot be mitigated by us. This does not mean they are definitely exploitable, but they may be, especially if exposed to the internet.
The following Linuxserver containers are unconfirmed as to their vulnerability status, but are Java-based and so may be using log4j in some capacity.
We will update this post as more information becomes available.
Last updated: February 18, 2022 at 4:19 PM