Denis, It is the log4j vulnerability, the fact that it doesn't affect some versions of log4j is in the vulnerability description. Please continue doing this - I appreciate it.
Most media reports call it simply log4j - but you can reduce the noise by calling it "Eclipse and log4j2 vulnerability (CVE-2021-44228)" Ed, I am delighted that we are dependent on a version of log4j that doesn't have this problem - but I wouldn't get too excited about promoting that Eclipse IDE hasn't updated a dependency. log4j 1.2 has been EOL for 6+ years (https://logging.apache.org/log4j/1.2/). I am glad this vulnerability doesn't exist, but log4j 1.2 does have its own problems - like CVE-2019-17571 - so nothing to get too excited about. Jonah ~~~ Jonah Graham Kichwa Coders www.kichwacoders.com On Mon, 13 Dec 2021 at 14:50, Denis Roy <denis....@eclipse-foundation.org> wrote: > IANAD so perhaps I'm the worst possible person to be doing this. > > > > On 2021-12-13 14:47, Ed Willink wrote: > > Hi > > Maybe the CVE is also misleading or the discussion here is very wrong. The > current Orbit repo contains > > org.apache.log4j 1.2.15 is clearly not log4j2. It has been in use > unchanged in every Eclipse distribution for at least the last ten years. > > The analysis on this thread has been about org.apache.logging.log4j which > could be a log4j2. It is unused in core and many Eclipse configurations. > > Please be precise. > > Regards > > Ed Willink > > On 13/12/2021 19:33, Denis Roy wrote: > > The CVE shows: Apache Log4j2 > > I would assume that is correct. > > > On 2021-12-13 14:31, Ed Willink wrote: > > Hi > > Please start by correctly referencing the vulnerability. > > It is with org.apache.logging.log4j, > > There is no issue with org.apache.log4j so continually referring to this > as a log4j vulnerability is very misleading. > > AFAICT no Eclipse installation of mine has ever included > org.apache.logging.log4j. > > Regards > > Ed Willink > On 13/12/2021 19:15, Denis Roy wrote: > > How about I start: > > > title: *Eclipse and log4j vulnerability **(CVE-2021-442280)* > > Here is the status of the various Eclipse Foundation projects, with > regards to CVE-2021-442280: > > > - Eclipse IDE 2021-12: *not vulnerable* > > - Eclipse Jetty (version): status > > - Eclipse GlassFish (version): status > > - Eclipse jGit (version): status > > > We would likely need to get the input from other projects, to > "self-certify". I can do this by reaching out to eclipse.org-committers if > anyone agrees. > > At this point, most of Europe is logged out for the day, and time is > ticking away fast for this sort of action. > > > Denis > > > > > > On 2021-12-13 14:00, Jonah Graham wrote: > > Hi Denis, > > Yes - that seems best. I can help with the actual story - as can others on > this list (I hope :-). > > Jonah > ~~~ > Jonah Graham > Kichwa Coders > www.kichwacoders.com > > > On Mon, 13 Dec 2021 at 13:58, Denis Roy <denis....@eclipse-foundation.org> > wrote: > >> Good question. >> >> If we agree on a story (ie, if someone can help me write what the actual >> story is), I can certainly post a blog post on the blogs.eclipse.org >> domain. From there, we could tweet about it from the official @EclipseFdn >> twitter account, and perhaps add links to the post from the Newcomers forum. >> >> Does that seem acceptable? >> >> >> Denis >> >> >> >> >> >> On 2021-12-13 13:44, Jonah Graham wrote: >> >> Thanks everyone for working on this - I think we have a pretty good story >> now about what the Eclipse IDE / SimRel has done for the log4j >> vulnerability. >> >> The last thing is to say so in a concise way - where can/should we say so >> (besides this mailing list)? >> >> Thanks, >> Jonah >> ~~~ >> Jonah Graham >> Kichwa Coders >> www.kichwacoders.com >> >> >> On Mon, 13 Dec 2021 at 12:58, Ed Merks <ed.me...@gmail.com> wrote: >> >>> Christoph, >>> >>> I really appreciate your creative ideas. I think "we, i.e., as an I" >>> should indeed plan long term for the possibility of expedient mitigation >>> of such problems in the future using this type of approach. >>> >>> For the project catalogs I've regenerated them such than installing any >>> version of the RCP package (with any installer) will install the latest >>> version of Passage which strictly requires the updated/fix version of >>> org.apache.logging.log4j. Also any installer-created RCP package >>> installation will ask to update itself upon startup/restart. >>> >>> >>> https://git.eclipse.org/c/oomph/org.eclipse.oomph.git/commit/?id=929d140afc34ecdb85b7996c63ce0b36b6723a34 >>> >>> Another thought I had is that the donation support I've added opens a >>> browser page. In this case we could change the URL such that a page >>> with information about this CVE could be presented... >>> >>> But now it's late in the day and I'm done for now. >>> >>> Regards, >>> Ed >>> >>> On 13.12.2021 18:03, Christoph Läubrich wrote: >>> > Hi Ed, >>> > >>> > > One problem is we don't know all the things that strictly require the >>> > > older bundle. >>> > >>> > In the end what matters is that the bundle is no longer available. If >>> > we don't uninstall them at laes they won't resolve anymore and people >>> > will go to the project website, report an issue and/or install an >>> > update :-) >>> > >>> > > In the end it at the simplest, it could just be a feature with p2.inf >>> > > with negative requirements for bundles that have been determined to >>> be >>> > > unsafe. >>> > >>> > yep that's what I have had in mind, I think it would be cool to have >>> > one global feature "CVE Mitigation" or something and this >>> > requires/includes individual CVE features that ship with appropriate >>> > p2.inf items. >>> > Thus way, once added to an IDE this will enable us to make CVE fixes >>> > available tor a broad audience and make people more aware of them >>> > through the update capabilities of eclipse itself. >>> > >>> > >> What do you think does this sounds reasonable? >>> > > It's a creative idea. I like it. >>> > >>> > Good to hear! As you probably know much more about p2.inf magic than >>> > me can you craft such a feature so we can investigate this more? As >>> > mentioned before this is more an idea so I can't shar any concrete >>> > code samples yet and have no idea where this would bes be placed (part >>> > of the platform cbi? github/gitlab project under eclipse umbrella? >>> > eclipse cbi maybe?) >>> > >>> > >>> > Am 13.12.21 um 17:48 schrieb Ed Merks: >>> >> Christoph, >>> >> >>> >> Comments below. >>> >> >>> >> On 13.12.2021 17:29, Christoph Läubrich wrote: >>> >>> Hi Ed, >>> >>> >>> >>> I wonder if it would not be possible to publish a general purpose >>> >>> "CVE mitigation" Updatesite everyone could add to an existing >>> >>> eclipse install. >>> >> Of course not everyone has Passage installed, nor this specific >>> >> bundle... >>> >>> >>> >>> Such an Updatesite could contain a Unit for a given CVE (e.g. >>> >>> CVE-2021-44228 in this case) that defines a negative requirement on >>> >>> any affected version (in this case any org.apache.logging.log4j with >>> >>> version range < 2.15). >>> >> Yes that's theoretically possible. (And in the catalog I can easily >>> >> do this, but not all installation are installed from the catalog.) >>> >>> >>> >>> What will happen then is that P2 will give the user the choice to >>> >>> install this mitigation unit and uninstall >>> >> P2 generally wants to install features so such a thing would need to >>> >> be packaged up as a feature... >>> >>> >>> >>> a) the dangerous bundle >>> >>> b) any dependent and affected unit (passage in this case) >>> >>> >>> >>> from the current IDE. >>> >> One problem is we don't know all the things that strictly require the >>> >> older bundle. The parts of Passage contributed to the train only >>> >> have lower bounds, but there are Passage features that include this >>> >> bundle with an exact range... >>> >>> >>> >>> Once an Update is in place, passage could be installed (e.g. with a >>> >>> separate update-site) again including a fixed version of the >>> >>> problematic dependecy. >>> >>> >>> >> Another question is what else out there that might already be >>> >> installed depend on logging.log4j and would also need to be updated >>> >> or uninstalled? That's an open ended question... >>> >>> Even though such a site would currently need some kind of >>> >>> handcrafted metadata, we could enhance this so we probably once have >>> >>> some automatic import of CVE from public databases and automatic >>> >>> notification of users about new CVE affecting their IDE. >>> >>> >>> >> Yes, such a thing will follow some pattern so generating such a thing >>> >> would be good... >>> >>> Including such a site in a target platform of a build could >>> >>> effectively fail the build (and make projects automatically aware of >>> >>> new problems) as they arise, also preventing one from including >>> >>> problematic dependencies in the future. >>> >> In the end it at the simplest, it could just be a feature with p2.inf >>> >> with negative requirements for bundles that have been determined to >>> >> be unsafe. >>> >>> What do you think does this sounds reasonable? >>> >> It's a creative idea. I like it. >>> >>> Am 12.12.21 um 14:07 schrieb Ed Merks: >>> >>>> Alexander, >>> >>>> >>> >>>> Will you set the lower bound to force the fixed version and to >>> >>>> disallow the older version? >>> >>>> >>> >>>> If only the installer and its product catalogs were involved, I >>> >>>> could fix the problem easily by adding an update site and forcing >>> >>>> the version range to install the fixed version. I wouldn't even >>> >>>> need a new version of Passage to force/fix that... >>> >>>> >>> >>>> But we're also talking about the release train repository, which >>> >>>> would need a respin. Unfortunately there are updates in the SimRel >>> >>>> repo after the 2021-12 tag: >>> >>>> >>> >>>> Some of those will be needed because the >>> >>>> https://download.eclipse.org/eclipse/updates/4.22-I-builds >>> >>>> repository is gone. Hopefully other projects contributed stable >>> >>>> repositories with unchanging released content rather than pointing >>> >>>> at "moving target" that has changed its content since the release. >>> >>>> >>> >>>> If we decide we need to do a respin and we accomplish that, then >>> >>>> EPP needs to respin as well. This will be something the Planning >>> >>>> Council will need to discuss and to decide which actions to take. >>> >>>> >>> >>>> Only you know how Passage uses the logging facility to know if >>> >>>> there is in actual fact a risk. I.e., is Passage actually logging >>> >>>> information obtained from an internet connection and is that >>> >>>> actually enabled/activated in the RCP/RAP package itself? I.e., >>> >>>> does what Jens Lideström outlined apply? (Thanks Jens!) If not, >>> >>>> then perhaps we're unduly alarmed. I could see nothing that >>> >>>> appears to be related to Passage in an IDE into which I installed >>> >>>> Passage, i.e., no preferences, no wizards, no views, nothing >>> >>>> obvious. Is it perhaps the case that the security problems would >>> >>>> only manifest themselves in applications where Passage is deployed >>> >>>> at runtime for licensing control of that application? >>> >>>> >>> >>>> Please try to outline the risk factors of Passage's development >>> >>>> tools being installed in a IDE application to help inform the >>> >>>> Planning Council in making a decision. >>> >>>> >>> >>>> P.S., Passage in the only component on the 2021-12 train that is >>> >>>> affected; I cannot comment on all Eclipse-distributed content in >>> >>>> general... >>> >>>> >>> >>>> Regards, >>> >>>> Ed >>> >>>> >>> >>>> On 12.12.2021 11:04, Alexander Fedorov wrote: >>> >>>>> Passage Team is working to provide Eclipse Passage 2.2.1 that will >>> >>>>> consume fixed logger from >>> >>>>> >>> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository >>> >>>>> >>> >>>>> >>> >>>>> Ed, how could we then provide an update for released SimRel >>> 2021-12? >>> >>>>> >>> >>>>> Regards, >>> >>>>> AF >>> >>>>> >>> >>>>> P.S. I'm really surprised to have the only component affected >>> >>>>> after having org.apache.*logging**.log4j 2.8.2 *published in >>> >>>>> Eclipse Orbit starting from 2020-09 (6 releases). >>> >>>>> >>> >>>>> >>> >>>>> >>> >>>>> 12/12/2021 12:41 PM, Ed Merks пишет: >>> >>>>>> >>> >>>>>> Just to avoid any confusion such as that which Ed Willink >>> >>>>>> mentioned, the >>> >>>>>> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228 >>> >>>>>> issue is specifically about the class >>> >>>>>> org.apache.logging.log4j.core/lookup.JndiLookup.which is not in a >>> >>>>>> package provided by org.apache.*log4j *but rather in a package >>> >>>>>> provided by org.apache.*logging**.log4j *as illustrated here in a >>> >>>>>> CBI p2 aggregator repo view: >>> >>>>>> >>> >>>>>> Based on the analysis tool I've been developing for better >>> >>>>>> managing SimRel, e.g., to provide traceability and dependency >>> >>>>>> analysis, it's definitely the case that only Passage depends on >>> >>>>>> this bundle: >>> >>>>>> >>> >>>>>> >>> >>>>>> Specifically via bundle requirements (as opposed to package >>> >>>>>> requirements): >>> >>>>>> >>> >>>>>> >>> >>>>>> Those requirements have no upper bound, only an inclusive lower >>> >>>>>> bound, such that they will resolve and use any higher version of >>> >>>>>> org.apache.logging.log4j. As such, installing Passage with >>> >>>>>> >>> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository >>> >>>>>> in the available sites and enabling to use those, does install >>> >>>>>> the newer version: >>> >>>>>> >>> >>>>>> >>> >>>>>> The bad news is that the RCP/RAP package contains Passage and >>> >>>>>> hence the bad version of the org.apache.logging.log4j bundle. >>> >>>>>> >>> >>>>>> What's not clear is whether Passage actually logs messages whose >>> >>>>>> content can be externally subverted/exploited via contact to the >>> >>>>>> web and whether such actions are activity is actually enabled by >>> >>>>>> default, e.g., in the RCP/RAP package... >>> >>>>>> >>> >>>>>> Regards, >>> >>>>>> Ed >>> >>>>>> >>> >>>>>> >>> >>>>>> On 11.12.2021 20:48, Gunnar Wagenknecht wrote: >>> >>>>>>> Thanks Matthias! >>> >>>>>>> >>> >>>>>>> According to Wayne, 2.15 has already been vetted and is good for >>> >>>>>>> use: >>> >>>>>>> >>> https://www.eclipse.org/lists/eclipse.org-committers/msg01333.html >>> >>>>>>> >>> >>>>>>> -Gunnar >>> >>>>>>> >>> >>>>>>> -- >>> >>>>>>> Gunnar Wagenknecht >>> >>>>>>> gun...@wagenknecht.org, http://guw.io/ >>> >>>>>>> >>> >>>>>>> >>> >>>>>>> >>> >>>>>>>> On Dec 11, 2021, at 20:36, Matthias Sohn >>> >>>>>>>> <matthias.s...@gmail.com> wrote: >>> >>>>>>>> >>> >>>>>>>> On Sat, Dec 11, 2021 at 11:35 AM Gunnar Wagenknecht >>> >>>>>>>> <gun...@wagenknecht.org> wrote: >>> >>>>>>>> >>> >>>>>>>> Alexander, >>> >>>>>>>> >>> >>>>>>>>> On Dec 11, 2021, at 10:16, Alexander Fedorov >>> >>>>>>>>> <alexander.fedo...@arsysop.ru> wrote: >>> >>>>>>>>> It would be great to learn vulnerability clean-up process >>> >>>>>>>>> with >>> >>>>>>>>> Eclipse Orbit team to then apply it to Eclipse Passage. >>> >>>>>>>> >>> >>>>>>>> >>> >>>>>>>> There is no Orbit team. Orbit is driven by project >>> committers >>> >>>>>>>> using/needing libraries in Orbit. >>> >>>>>>>> I encourage the Eclipse Passage project to submit a Gerrit >>> >>>>>>>> review for a newer version. >>> >>>>>>>> >>> >>>>>>>> >>> >>>>>>>> considering the buzz around this vulnerability I went ahead and >>> >>>>>>>> pushed an update to log4j 2.15 for orbit >>> >>>>>>>> https://git.eclipse.org/r/c/orbit/orbit-recipes/+/188768 >>> >>>>>>>> note that the required clearlydefined score isn't reached yet, >>> >>>>>>>> if this doesn't change soon >>> >>>>>>>> maybe someone can contribute the missing information to >>> >>>>>>>> clearlydefined or >>> >>>>>>>> we file CQs to get the license approval for the new version >>> >>>>>>>> >>> >>>>>>>> You can also try a new way as described by Mickael here: >>> >>>>>>>> https://www.eclipse.org/lists/orbit-dev/msg05509.html >>> >>>>>>>> >> >> >> > _______________________________________________ > cross-project-issues-dev mailing list > cross-project-issues-dev@eclipse.org > To unsubscribe from this list, visit > https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev >
_______________________________________________ cross-project-issues-dev mailing list cross-project-issues-dev@eclipse.org To unsubscribe from this list, visit https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev