Debian Package Tracker
Register | Log in
Subscribe

log4cxx

Choose email to subscribe with

general
  • source: log4cxx (main)
  • version: 1.5.0-1
  • maintainer: Tobias Frost (DMD) (LowNMU)
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.11.0-2
  • o-o-sec: 0.11.0-2+deb11u1
  • oldstable: 1.0.0-1+deb12u1
  • stable: 1.4.0-1+deb13u1
  • testing: 1.5.0-1
  • unstable: 1.5.0-1
versioned links
  • 0.11.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.11.0-2+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.0.0-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.0-1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • liblog4cxx-dev
  • liblog4cxx-doc
  • liblog4cxx15
action needed
A new upstream version is available: 1.7.0 high
A new upstream version 1.7.0 is available, you should consider packaging it.
Created: 2025-12-16 Last update: 2026-04-15 11:02
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-40023: Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html , in versions before 1.7.0, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets in log messages, NDC, and MDC property keys and values, producing invalid XML output. Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity. Users are advised to upgrade to Apache Log4cxx 1.7.0, which fixes this issue.
Created: 2026-04-11 Last update: 2026-04-12 16:02
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-40023: Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html , in versions before 1.7.0, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets in log messages, NDC, and MDC property keys and values, producing invalid XML output. Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity. Users are advised to upgrade to Apache Log4cxx 1.7.0, which fixes this issue.
Created: 2026-04-11 Last update: 2026-04-12 16:02
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-40023: Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html , in versions before 1.7.0, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets in log messages, NDC, and MDC property keys and values, producing invalid XML output. Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity. Users are advised to upgrade to Apache Log4cxx 1.7.0, which fixes this issue.
Created: 2026-04-11 Last update: 2026-04-12 16:02
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2026-40023: Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html , in versions before 1.7.0, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets in log messages, NDC, and MDC property keys and values, producing invalid XML output. Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity. Users are advised to upgrade to Apache Log4cxx 1.7.0, which fixes this issue.
Created: 2026-04-11 Last update: 2026-04-12 16:02
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2026-40023: Apache Log4cxx's XMLLayout https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html , in versions before 1.7.0, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets in log messages, NDC, and MDC property keys and values, producing invalid XML output. Conforming XML parsers must reject such documents with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. An attacker who can influence logged data can exploit this to suppress individual log records, impairing audit trails and detection of malicious activity. Users are advised to upgrade to Apache Log4cxx 1.7.0, which fixes this issue.
Created: 2026-04-11 Last update: 2026-04-12 16:02
debian/patches: 1 patch with invalid metadata high

Among the 3 debian patches available in version 1.5.0-1 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
Created: 2024-05-17 Last update: 2025-10-05 09:01
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 1.5.0-3, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 470bd1cd8f7956f2e50b8fadda476a83968024c9
Author: Tobias Frost <tobi@debian.org>
Date:   Mon Nov 17 19:00:58 2025 +0100

    Use {DEB_HOST_MULTIARCH} instead of wildcard in d/*install.
Created: 2025-11-17 Last update: 2026-04-11 21:01
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-28 Last update: 2026-02-28 19:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2025-12-07] Accepted log4cxx 1.0.0-1+deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Tobias Frost)
  • [2025-11-07] Accepted log4cxx 1.4.0-1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Tobias Frost)
  • [2025-10-08] log4cxx 1.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-04] Accepted log4cxx 0.11.0-2+deb11u1 (source) into oldoldstable-security (Lukas Märdian)
  • [2025-10-04] Accepted log4cxx 1.5.0-1 (source) into unstable (Tobias Frost)
  • [2025-10-01] log4cxx 1.4.0-1.1 MIGRATED to testing (Debian testing watch)
  • [2025-09-28] Accepted log4cxx 1.4.0-1.1 (source) into unstable (Lukas Märdian)
  • [2025-03-24] log4cxx 1.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-22] Accepted log4cxx 1.4.0-1 (source) into unstable (Tobias Frost)
  • [2025-01-09] log4cxx 1.3.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-04] Accepted log4cxx 1.3.1-1 (source) into unstable (Tobias Frost)
  • [2024-10-24] log4cxx 1.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-20] Accepted log4cxx 1.3.0-1 (source) into unstable (Tobias Frost)
  • [2024-05-19] log4cxx 1.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-05-16] Accepted log4cxx 1.2.0-1 (source) into unstable (Tobias Frost)
  • [2023-06-29] log4cxx 1.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-23] Accepted log4cxx 1.1.0-1 (source) into unstable (Tobias Frost)
  • [2023-05-09] Accepted log4cxx 1.1.0-1~exp1 (source) into experimental (Tobias Frost)
  • [2023-01-11] log4cxx 1.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-01-09] Accepted log4cxx 1.0.0-1 (source) into unstable (Tobias Frost)
  • [2023-01-06] Accepted log4cxx 1.0.0~rc1-1 (source) into experimental (Tobias Frost)
  • [2023-01-01] Accepted log4cxx 1.0.0~~gitcbd23ff1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Tobias Frost)
  • [2022-06-14] log4cxx 0.13.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-12] Accepted log4cxx 0.13.0-2 (source) into unstable (Tobias Frost)
  • [2022-05-27] Accepted log4cxx 0.13.0-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Tobias Frost)
  • [2022-01-12] log4cxx 0.12.1-4 MIGRATED to testing (Debian testing watch)
  • [2022-01-09] Accepted log4cxx 0.12.1-4 (source) into unstable (Tobias Frost)
  • [2022-01-07] Accepted log4cxx 0.12.1-3 (source) into experimental (Tobias Frost)
  • [2022-01-07] Accepted log4cxx 0.12.1-2 (source) into experimental (Tobias Frost)
  • [2021-12-15] Accepted log4cxx 0.12.1-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Tobias Frost)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.5.0-1
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing