JNDI is a Java API (Java Naming and Directory Interface) for abstracting various networking APIs like LDAP, DNS, etc. It’s not present in .NET or C++ (or any non-JVM language), so it does not affect log4net or log4cxx. -- Matt Sicker
> On Dec 14, 2021, at 08:54, David Schwartz <david.schwa...@ni.com> wrote: > > Hi Joe, > > Adding to what Davyd wrote. I just searched the codebase and the JndiLookup > class (where the log4j vulnerability was found) does not exist in log4net. > In fact, there is no code related to jndi at all as far as I can see. > > David > > -----Original Message----- > From: Davyd McColl <dav...@gmail.com <mailto:dav...@gmail.com>> > Sent: Tuesday, December 14, 2021 4:10 PM > To: dev@logging.apache.org <mailto:dev@logging.apache.org> > Subject: [EXTERNAL] Re: log4net > > Hi Joe > > No, it shouldn't, particularly because we're very different projects, on very > different platforms, and I understand that the log4j vuln is largely linked > to a _dependency_ of log4j. The closest we've had was an xml vuln that was > patched some time ago. > > That being said, I'm currently the only maintainer and I definitely have > written the least code in log4net, so if you or anyone else would like to > audit for vulnerabilities (and, even better, PR mitigations), I'm all for it. > > -d > > > On December 14, 2021 16:03:39 Joe Kelly <joe.ke...@okcu.org> wrote: > >> I was wondering if the log4net service has a similar vulnerability as >> log4j. There isn't any information on the log4net security page and >> the current version of 2.0.13 doesn't match the log4j version of 2.16.0. >> >> Joe Kelly >> Information Security Analyst >> P: 405.763.5425 >> F: 405.602.6337 >> https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55 >> <https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55> >> e93GuHBF0X4qMKophICSr0Nb5ggI6RBgb2lJoysQv8jdWynWoouaTpixMWg$ >> <https://urldefense.com/v3/__https://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye >> <https://urldefense.com/v3/__https://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye> >> 55e93GuHBF0X4qMKophICSr0Nb5ggI6RBgb2lJoysQv8jdWynWoouYBYxYhmg$ > >> >> joe.ke...@okcu.org <mailto:joe.ke...@okcu.org> <mailto:joe.ke...@okcu.org >> <mailto:joe.ke...@okcu.org>> Oklahoma's Credit Union >> Happy to Help(r) >> >> >> >> >> >> ________________________________ >> >> NOTICE: >> This e-mail is intended solely for the use of the individual to whom >> it is addressed and may contain information that is privileged, >> confidential or otherwise exempt from disclosure. If the reader of >> this e-mail is not the intended recipient or the employee or agent >> responsible for delivering the message to the intended recipient, you >> are hereby notified that any dissemination, distribution, or copying >> of this communication is strictly prohibited. If you have received >> this communication in error, please immediately notify us by replying >> to the original message at the listed email address. >> >> Happy to Help >> Oklahoma's Credit Union >> https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55 >> <https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55> >> e93GuHBF0X4qMKophICSr0Nb5ggI6RBgb2lJoysQv8jdWynWoouaTpixMWg$ > > INTERNAL - NI CONFIDENTIAL