I filed this issue so we have something to track:
https://github.com/apache/helix/issues/1921

I'm attempting to get Log4J 2.16.x building and running properly locally.
I will submit a PR if I can get it working.

Thanks!

On Tue, Dec 14, 2021 at 8:40 AM Brent <brentwritesc...@gmail.com> wrote:

> Thanks Hunter, much appreciated!  I will try to put together a patch with
> what I've done for remediation elsewhere (good news is it's not much since
> Helix still inherits Log4J 1.x).  If you wouldn't mind, I might also file
> an issue to consider upgrading to Log4J 2.16.x that was just pushed out (
> https://lists.apache.org/thread/d6v4r6nosxysyq9rvnr779336yf0woz4).  That
> one will require some more thought to make sure things don't break I
> suspect.
>
> ~Brent
>
> On Mon, Dec 13, 2021 at 1:42 PM Hunter Lee <naren...@gmail.com> wrote:
>
>> This is being discussed. Feel free to post a patch if you're interested
>> (but do let us know so there's no duplicate effort being made here).
>>
>> On Fri, Dec 10, 2021 at 1:33 PM Brent <brentwritesc...@gmail.com> wrote:
>>
>> > [Feel free to take this offline or out-of-band if this is an
>> inappropriate
>> > place to discuss this]
>> >
>> > Is there any hotfixing planned as a result of the Log4J zero day going
>> > around?
>> >
>> > Reference: https://www.lunasec.io/docs/blog/log4j-zero-day/
>> > CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-44228
>> >
>> > From what I can tell, Helix seems to be building with
>> > https://mvnrepository.com/artifact/org.slf4j/slf4j-log4j12/1.7.14
>> which in
>> > turn maps to https://mvnrepository.com/artifact/log4j/log4j/1.2.17
>> >
>> > The exploit is more prevalent in the 2.x versions of Log4J, but there
>> are
>> > scenarios where 1.x is exploitable and it's been pointed out that 1.x is
>> > also end of life and has other vulnerabilities.
>> >
>> > See:
>> >
>> https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
>> >
>> > Thanks!
>> >
>> > ~Brent
>> >
>>
>

Reply via email to