[ 
https://issues.apache.org/jira/browse/RATIS-1477?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Tsz-wo Sze updated RATIS-1477:
------------------------------
    Description: 
According to https://www.slf4j.org/log4shell.html , 
{quote}
..., log4j 1.x comes with JMSAppender which will perform a JNDI lookup if 
enabled in log4j's configuration file, i.e. log4j.properties or log4j.xml.
{quote}
Therefore, it is better to exclude JMSAppender.class from the generated jar.

See also [CVE-2021-4104|https://nvd.nist.gov/vuln/detail/CVE-2021-4104].

  was:
According to https://www.slf4j.org/log4shell.html , 
{quote}
..., log4j 1.x comes with JMSAppender which will perform a JNDI lookup if 
enabled in log4j's configuration file, i.e. log4j.properties or log4j.xml.
{quote}
Therefore, it is better to exclude JMSAppender.class from the generated jar.


> Exclude log4j JMSAppender.class in jar
> --------------------------------------
>
>                 Key: RATIS-1477
>                 URL: https://issues.apache.org/jira/browse/RATIS-1477
>             Project: Ratis
>          Issue Type: Improvement
>          Components: build
>            Reporter: Tsz-wo Sze
>            Assignee: Tsz-wo Sze
>            Priority: Major
>             Fix For: 2.3.0
>
>          Time Spent: 20m
>  Remaining Estimate: 0h
>
> According to https://www.slf4j.org/log4shell.html , 
> {quote}
> ..., log4j 1.x comes with JMSAppender which will perform a JNDI lookup if 
> enabled in log4j's configuration file, i.e. log4j.properties or log4j.xml.
> {quote}
> Therefore, it is better to exclude JMSAppender.class from the generated jar.
> See also [CVE-2021-4104|https://nvd.nist.gov/vuln/detail/CVE-2021-4104].



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to