The stated changelog for log4j2 version 2.16.0 is ...

* LOG4J2-3208: Disable JNDI by default. Require log4j2.enableJndi to be set
to true to allow JNDI.
* LOG4J2-3211: Completely remove support for Message Lookups.

Changelog from the mailing list -
https://lists.apache.org/thread/6g0ls1cc9htn52hr0kkbo7dds5ts3rb5

- Joakim

On Mon, Dec 13, 2021 at 2:44 PM Joakim Erdfelt <joakim.erdf...@gmail.com>
wrote:

> log4j2 version 2.16.0 just showed up on maven central a few moments ago.
>
> https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.16.0/
> https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.16.0/
>
> - Joakim
>
> On Mon, Dec 13, 2021 at 2:06 PM Matthias Sohn <matthias.s...@gmail.com>
> wrote:
>
>> I think there is some confusion since naming of log4j 1 and 2 artefacts
>> is a bit confusing:
>>
>> *log4j 1.x*
>>
>> maven artefact log4j:
>> log4j:log4j:1.2.17
>>
>> bundle in Orbit log4j
>> org.apache.log4j 1.2.15.v201012070815
>>
>> slf4j log4j 1 binding to use log4j 1.x with libraries using slf4j api:
>> org.slf4j:slf4j-log4j12:1.7.32
>>
>> *log4j 2.x*
>>
>> maven artefact log4j 2.x:
>> org.apache.logging.log4j:log4j-api:2.15.0
>> org.apache.logging.log4j:log4j-core:2.15.0
>>
>> bundle in Orbit log4j 2.x: org.apache.logging.log4j 2.15.0.v20211211-1928
>> (contains classes from both log4j-core and log4j-api)
>>
>> slf4j log4j 2 binding to use log4j with libraries using slf4j api:
>> org.apache.logging.log4j:log4j-slf4j-impl:2.15.0
>>
>>
>>
>> On Mon, Dec 13, 2021 at 8:33 PM Denis Roy <
>> denis....@eclipse-foundation.org> wrote:
>>
>>> The CVE shows: Apache Log4j2
>>>
>>> I would assume that is correct.
>>>
>>>
>>> On 2021-12-13 14:31, Ed Willink wrote:
>>>
>>> Hi
>>>
>>> Please start by correctly referencing the vulnerability.
>>>
>>> It is with org.apache.logging.log4j,
>>>
>>> There is no issue with org.apache.log4j so continually referring to this
>>> as a log4j vulnerability is very misleading.
>>>
>>> AFAICT no Eclipse installation of mine has ever included
>>> org.apache.logging.log4j.
>>>
>>> Regards
>>>
>>> Ed Willink
>>> On 13/12/2021 19:15, Denis Roy wrote:
>>>
>>> How about I start:
>>>
>>>
>>> title: *Eclipse and log4j vulnerability **(CVE-2021-442280)*
>>>
>>> Here is the status of the various Eclipse Foundation projects, with
>>> regards to CVE-2021-442280:
>>>
>>>
>>> - Eclipse IDE 2021-12: *not vulnerable*
>>>
>>> - Eclipse Jetty (version): status
>>>
>>> - Eclipse GlassFish (version): status
>>>
>>> - Eclipse jGit (version): status
>>>
>>>
>>> We would likely need to get the input from other projects, to
>>> "self-certify".  I can do this by reaching out to eclipse.org-committers if
>>> anyone agrees.
>>>
>>> At this point, most of Europe is logged out for the day, and time is
>>> ticking away fast for this sort of action.
>>>
>>>
>>> Denis
>>>
>>>
>>>
>>>
>>>
>>> On 2021-12-13 14:00, Jonah Graham wrote:
>>>
>>> Hi Denis,
>>>
>>> Yes - that seems best. I can help with the actual story - as can others
>>> on this list (I hope :-).
>>>
>>> Jonah
>>> ~~~
>>> Jonah Graham
>>> Kichwa Coders
>>> www.kichwacoders.com
>>>
>>>
>>> On Mon, 13 Dec 2021 at 13:58, Denis Roy <
>>> denis....@eclipse-foundation.org> wrote:
>>>
>>>> Good question.
>>>>
>>>> If we agree on a story (ie, if someone can help me write what the
>>>> actual story is), I can certainly post a blog post on the
>>>> blogs.eclipse.org domain. From there, we could tweet about it from the
>>>> official @EclipseFdn twitter account, and perhaps add links to the post
>>>> from the Newcomers forum.
>>>>
>>>> Does that seem acceptable?
>>>>
>>>>
>>>> Denis
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On 2021-12-13 13:44, Jonah Graham wrote:
>>>>
>>>> Thanks everyone for working on this - I think we have a pretty good
>>>> story now about what the Eclipse IDE / SimRel has done for the log4j
>>>> vulnerability.
>>>>
>>>> The last thing is to say so in a concise way - where can/should we say
>>>> so (besides this mailing list)?
>>>>
>>>> Thanks,
>>>> Jonah
>>>> ~~~
>>>> Jonah Graham
>>>> Kichwa Coders
>>>> www.kichwacoders.com
>>>>
>>>>
>>>> On Mon, 13 Dec 2021 at 12:58, Ed Merks <ed.me...@gmail.com> wrote:
>>>>
>>>>> Christoph,
>>>>>
>>>>> I really appreciate your creative ideas.  I think "we, i.e., as an I"
>>>>> should indeed plan long term for the possibility of expedient
>>>>> mitigation
>>>>> of such problems in the future using this type of approach.
>>>>>
>>>>> For the project catalogs I've regenerated them such than installing
>>>>> any
>>>>> version of the RCP package (with any installer) will install the
>>>>> latest
>>>>> version of Passage which strictly requires the updated/fix version of
>>>>> org.apache.logging.log4j.  Also any installer-created RCP package
>>>>> installation will ask to update itself upon startup/restart.
>>>>>
>>>>>
>>>>> https://git.eclipse.org/c/oomph/org.eclipse.oomph.git/commit/?id=929d140afc34ecdb85b7996c63ce0b36b6723a34
>>>>>
>>>>> Another thought I had is that the donation support I've added opens a
>>>>> browser page.  In this case we could change the URL such that a page
>>>>> with information about this CVE could be presented...
>>>>>
>>>>> But now it's late in the day and I'm done for now.
>>>>>
>>>>> Regards,
>>>>> Ed
>>>>>
>>>>> On 13.12.2021 18:03, Christoph Läubrich wrote:
>>>>> > Hi Ed,
>>>>> >
>>>>> > > One problem is we don't know all the things that strictly require
>>>>> the
>>>>> > > older bundle.
>>>>> >
>>>>> > In the end what matters is that the bundle is no longer available.
>>>>> If
>>>>> > we don't uninstall them at laes they won't resolve anymore and
>>>>> people
>>>>> > will go to the project website, report an issue and/or install an
>>>>> > update :-)
>>>>> >
>>>>> > > In the end it at the simplest, it could just be a feature with
>>>>> p2.inf
>>>>> > > with negative requirements for bundles that have been determined
>>>>> to be
>>>>> > > unsafe.
>>>>> >
>>>>> > yep that's what I have had in mind, I think it would be cool to have
>>>>> > one global feature "CVE Mitigation" or something and this
>>>>> > requires/includes individual CVE features that ship with appropriate
>>>>> > p2.inf items.
>>>>> > Thus way, once added to an IDE this will enable us to make CVE fixes
>>>>> > available tor a broad audience and make people more aware of them
>>>>> > through the update capabilities of eclipse itself.
>>>>> >
>>>>> > >> What do you think does this sounds reasonable?
>>>>> > > It's a creative idea.  I like it.
>>>>> >
>>>>> > Good to hear! As you probably know much more about p2.inf magic than
>>>>> > me can you craft such a feature so we can investigate this more? As
>>>>> > mentioned before this is more an idea so I can't shar any concrete
>>>>> > code samples yet and have no idea where this would bes be placed
>>>>> (part
>>>>> > of the platform cbi? github/gitlab project under eclipse umbrella?
>>>>> > eclipse cbi maybe?)
>>>>> >
>>>>> >
>>>>> > Am 13.12.21 um 17:48 schrieb Ed Merks:
>>>>> >> Christoph,
>>>>> >>
>>>>> >> Comments below.
>>>>> >>
>>>>> >> On 13.12.2021 17:29, Christoph Läubrich wrote:
>>>>> >>> Hi Ed,
>>>>> >>>
>>>>> >>> I wonder if it would not be possible to publish a general purpose
>>>>> >>> "CVE mitigation" Updatesite everyone could add to an existing
>>>>> >>> eclipse install.
>>>>> >> Of course not everyone has Passage installed, nor this specific
>>>>> >> bundle...
>>>>> >>>
>>>>> >>> Such an Updatesite could contain a Unit for a given CVE (e.g.
>>>>> >>> CVE-2021-44228 in this case) that defines a negative requirement
>>>>> on
>>>>> >>> any affected version (in this case any org.apache.logging.log4j
>>>>> with
>>>>> >>> version range < 2.15).
>>>>> >> Yes that's theoretically possible.  (And in the catalog I can
>>>>> easily
>>>>> >> do this, but not all installation are installed from the catalog.)
>>>>> >>>
>>>>> >>> What will happen then is that P2 will give the user the choice to
>>>>> >>> install this mitigation unit and uninstall
>>>>> >> P2 generally wants to install features so such a thing would need
>>>>> to
>>>>> >> be packaged up as a feature...
>>>>> >>>
>>>>> >>> a) the dangerous bundle
>>>>> >>> b) any dependent and affected unit (passage in this case)
>>>>> >>>
>>>>> >>> from the current IDE.
>>>>> >> One problem is we don't know all the things that strictly require
>>>>> the
>>>>> >> older bundle.  The parts of Passage contributed to the train only
>>>>> >> have lower bounds, but there are Passage features that include this
>>>>> >> bundle with an exact range...
>>>>> >>>
>>>>> >>> Once an Update is in place, passage could be installed (e.g. with
>>>>> a
>>>>> >>> separate update-site) again including a fixed version of the
>>>>> >>> problematic dependecy.
>>>>> >>>
>>>>> >> Another question is what else out there that might already be
>>>>> >> installed depend on logging.log4j and would also need to be updated
>>>>> >> or uninstalled?  That's an open ended question...
>>>>> >>> Even though such a site would currently need some kind of
>>>>> >>> handcrafted metadata, we could enhance this so we probably once
>>>>> have
>>>>> >>> some automatic import of CVE from public databases and automatic
>>>>> >>> notification of users about new CVE affecting their IDE.
>>>>> >>>
>>>>> >> Yes, such a thing will follow some pattern so generating such a
>>>>> thing
>>>>> >> would be good...
>>>>> >>> Including such a site in a target platform of a build could
>>>>> >>> effectively fail the build (and make projects automatically aware
>>>>> of
>>>>> >>> new problems) as they arise, also preventing one from including
>>>>> >>> problematic dependencies in the future.
>>>>> >> In the end it at the simplest, it could just be a feature with
>>>>> p2.inf
>>>>> >> with negative requirements for bundles that have been determined to
>>>>> >> be unsafe.
>>>>> >>> What do you think does this sounds reasonable?
>>>>> >> It's a creative idea.  I like it.
>>>>> >>> Am 12.12.21 um 14:07 schrieb Ed Merks:
>>>>> >>>> Alexander,
>>>>> >>>>
>>>>> >>>> Will you set the lower bound to force the fixed version and to
>>>>> >>>> disallow the older version?
>>>>> >>>>
>>>>> >>>> If only the installer and its product catalogs were involved, I
>>>>> >>>> could fix the problem easily by adding an update site and forcing
>>>>> >>>> the version range to install the fixed version.  I wouldn't even
>>>>> >>>> need a new version of Passage to force/fix that...
>>>>> >>>>
>>>>> >>>> But we're also talking about the release train repository, which
>>>>> >>>> would need a respin.  Unfortunately there are updates in the
>>>>> SimRel
>>>>> >>>> repo after the 2021-12 tag:
>>>>> >>>>
>>>>> >>>> Some of those will be needed because the
>>>>> >>>> https://download.eclipse.org/eclipse/updates/4.22-I-builds
>>>>> >>>> repository is gone.  Hopefully other projects contributed stable
>>>>> >>>> repositories with unchanging released content rather than
>>>>> pointing
>>>>> >>>> at "moving target" that has changed its content since the release.
>>>>> >>>>
>>>>> >>>> If we decide we need to do a respin and we accomplish that, then
>>>>> >>>> EPP needs to respin as well.   This will be something the
>>>>> Planning
>>>>> >>>> Council will need to discuss and to decide which actions to take.
>>>>> >>>>
>>>>> >>>> Only you know how Passage uses the logging facility to know if
>>>>> >>>> there is in actual fact a risk.  I.e., is Passage actually
>>>>> logging
>>>>> >>>> information obtained from an internet connection and is that
>>>>> >>>> actually enabled/activated in the RCP/RAP package itself? I.e.,
>>>>> >>>> does what Jens Lideström outlined apply?  (Thanks Jens!)  If not,
>>>>> >>>> then perhaps we're unduly alarmed.  I could see nothing that
>>>>> >>>> appears to be related to Passage in an IDE into which I installed
>>>>> >>>> Passage, i.e., no preferences, no wizards, no views, nothing
>>>>> >>>> obvious.   Is it perhaps the case that the security problems
>>>>> would
>>>>> >>>> only manifest themselves in applications where Passage is
>>>>> deployed
>>>>> >>>> at runtime for licensing control of that application?
>>>>> >>>>
>>>>> >>>> Please try to outline the risk factors of Passage's development
>>>>> >>>> tools being installed in a IDE application to help inform the
>>>>> >>>> Planning Council in making a decision.
>>>>> >>>>
>>>>> >>>> P.S., Passage in the only component on the 2021-12 train that is
>>>>> >>>> affected; I cannot comment on all Eclipse-distributed content in
>>>>> >>>> general...
>>>>> >>>>
>>>>> >>>> Regards,
>>>>> >>>> Ed
>>>>> >>>>
>>>>> >>>> On 12.12.2021 11:04, Alexander Fedorov wrote:
>>>>> >>>>> Passage Team is working to provide Eclipse Passage 2.2.1 that
>>>>> will
>>>>> >>>>> consume fixed logger from
>>>>> >>>>>
>>>>> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository
>>>>> >>>>>
>>>>> >>>>>
>>>>> >>>>> Ed, how could we then provide an update for released SimRel
>>>>> 2021-12?
>>>>> >>>>>
>>>>> >>>>> Regards,
>>>>> >>>>> AF
>>>>> >>>>>
>>>>> >>>>> P.S. I'm really surprised to have the only component affected
>>>>> >>>>> after having org.apache.*logging**.log4j 2.8.2 *published in
>>>>> >>>>> Eclipse Orbit starting from 2020-09 (6 releases).
>>>>> >>>>>
>>>>> >>>>>
>>>>> >>>>>
>>>>> >>>>> 12/12/2021 12:41 PM, Ed Merks пишет:
>>>>> >>>>>>
>>>>> >>>>>> Just to avoid any confusion such as that which Ed Willink
>>>>> >>>>>> mentioned, the
>>>>> >>>>>> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
>>>>> >>>>>> issue is specifically about the class
>>>>> >>>>>> org.apache.logging.log4j.core/lookup.JndiLookup.which is not in
>>>>> a
>>>>> >>>>>> package provided by org.apache.*log4j *but rather in a package
>>>>> >>>>>> provided by org.apache.*logging**.log4j *as illustrated here in
>>>>> a
>>>>> >>>>>> CBI p2 aggregator repo view:
>>>>> >>>>>>
>>>>> >>>>>> Based on the analysis tool I've been developing for better
>>>>> >>>>>> managing SimRel, e.g., to provide traceability and dependency
>>>>> >>>>>> analysis, it's definitely the case that only Passage depends on
>>>>> >>>>>> this bundle:
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>> Specifically via bundle requirements (as opposed to package
>>>>> >>>>>> requirements):
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>> Those requirements have no upper bound, only an inclusive lower
>>>>> >>>>>> bound, such that they will resolve and use any higher version
>>>>> of
>>>>> >>>>>> org.apache.logging.log4j.  As such, installing Passage with
>>>>> >>>>>>
>>>>> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository
>>>>> >>>>>> in the available sites and enabling to use those, does install
>>>>> >>>>>> the newer version:
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>> The bad news is that the RCP/RAP package contains Passage and
>>>>> >>>>>> hence the bad version of the org.apache.logging.log4j bundle.
>>>>> >>>>>>
>>>>> >>>>>> What's not clear is whether Passage actually logs messages
>>>>> whose
>>>>> >>>>>> content can be externally subverted/exploited via contact to
>>>>> the
>>>>> >>>>>> web and whether such actions are activity is actually enabled
>>>>> by
>>>>> >>>>>> default, e.g., in the RCP/RAP package...
>>>>> >>>>>>
>>>>> >>>>>> Regards,
>>>>> >>>>>> Ed
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>> On 11.12.2021 20:48, Gunnar Wagenknecht wrote:
>>>>> >>>>>>> Thanks Matthias!
>>>>> >>>>>>>
>>>>> >>>>>>> According to Wayne, 2.15 has already been vetted and is good
>>>>> for
>>>>> >>>>>>> use:
>>>>> >>>>>>>
>>>>> https://www.eclipse.org/lists/eclipse.org-committers/msg01333.html
>>>>> >>>>>>>
>>>>> >>>>>>> -Gunnar
>>>>> >>>>>>>
>>>>> >>>>>>> --
>>>>> >>>>>>> Gunnar Wagenknecht
>>>>> >>>>>>> gun...@wagenknecht.org, http://guw.io/
>>>>> >>>>>>>
>>>>> >>>>>>>
>>>>> >>>>>>>
>>>>> >>>>>>>> On Dec 11, 2021, at 20:36, Matthias Sohn
>>>>> >>>>>>>> <matthias.s...@gmail.com> wrote:
>>>>> >>>>>>>>
>>>>> >>>>>>>> On Sat, Dec 11, 2021 at 11:35 AM Gunnar Wagenknecht
>>>>> >>>>>>>> <gun...@wagenknecht.org> wrote:
>>>>> >>>>>>>>
>>>>> >>>>>>>>     Alexander,
>>>>> >>>>>>>>
>>>>> >>>>>>>>>     On Dec 11, 2021, at 10:16, Alexander Fedorov
>>>>> >>>>>>>>>     <alexander.fedo...@arsysop.ru> wrote:
>>>>> >>>>>>>>>     It would be great to learn vulnerability clean-up
>>>>> process
>>>>> >>>>>>>>> with
>>>>> >>>>>>>>>     Eclipse Orbit team to then apply it to Eclipse Passage.
>>>>> >>>>>>>>
>>>>> >>>>>>>>
>>>>> >>>>>>>>     There is no Orbit team. Orbit is driven by project
>>>>> committers
>>>>> >>>>>>>>     using/needing libraries in Orbit.
>>>>> >>>>>>>>     I encourage the Eclipse Passage project to submit a Gerrit
>>>>> >>>>>>>>     review for a newer version.
>>>>> >>>>>>>>
>>>>> >>>>>>>>
>>>>> >>>>>>>> considering the buzz around this vulnerability I went ahead
>>>>> and
>>>>> >>>>>>>> pushed an update to log4j 2.15 for orbit
>>>>> >>>>>>>> https://git.eclipse.org/r/c/orbit/orbit-recipes/+/188768
>>>>> >>>>>>>> note that the required clearlydefined score isn't reached
>>>>> yet,
>>>>> >>>>>>>> if this doesn't change soon
>>>>> >>>>>>>> maybe someone can contribute the missing information to
>>>>> >>>>>>>> clearlydefined or
>>>>> >>>>>>>> we file CQs to get the license approval for the new version
>>>>> >>>>>>>>
>>>>> >>>>>>>>     You can also try a new way as described by Mickael here:
>>>>> >>>>>>>> https://www.eclipse.org/lists/orbit-dev/msg05509.html
>>>>> >>>>>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> cross-project-issues-dev mailing list
>>>> cross-project-issues-dev@eclipse.org
>>>> To unsubscribe from this list, visit
>>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>>
>>>
>>> _______________________________________________
>>> cross-project-issues-dev mailing listcross-project-issues-...@eclipse.org
>>> To unsubscribe from this list, visit 
>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>
>>> --
>>>
>>> *Denis Roy*
>>>
>>> *Director, IT Services | **Eclipse Foundation*
>>>
>>> *Eclipse Foundation* <http://www.eclipse.org/>*: The Community for Open
>>> Innovation and Collaboration*
>>>
>>> Twitter: @droy_eclipse
>>>
>>> _______________________________________________
>>> cross-project-issues-dev mailing listcross-project-issues-...@eclipse.org
>>> To unsubscribe from this list, visit 
>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>
>>>
>>>
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>>  Virus-free.
>>> www.avast.com
>>> <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
>>> <#m_-3328732685233212968_m_188903747482311703_m_-5599836476997852677_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
>>>
>>> _______________________________________________
>>> cross-project-issues-dev mailing listcross-project-issues-...@eclipse.org
>>> To unsubscribe from this list, visit 
>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>
>>> --
>>>
>>> *Denis Roy*
>>>
>>> *Director, IT Services | **Eclipse Foundation*
>>>
>>> *Eclipse Foundation* <http://www.eclipse.org/>*: The Community for Open
>>> Innovation and Collaboration*
>>>
>>> Twitter: @droy_eclipse
>>> _______________________________________________
>>> cross-project-issues-dev mailing list
>>> cross-project-issues-dev@eclipse.org
>>> To unsubscribe from this list, visit
>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>>
>> _______________________________________________
>> cross-project-issues-dev mailing list
>> cross-project-issues-dev@eclipse.org
>> To unsubscribe from this list, visit
>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>>
>
_______________________________________________
cross-project-issues-dev mailing list
cross-project-issues-dev@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev

Reply via email to