[ 
https://issues.apache.org/jira/browse/AVRO-3304?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17478115#comment-17478115
 ] 

Ryan Skraba commented on AVRO-3304:
-----------------------------------

I did the alternate implementation (suggested by [~mgrigorov]) that drops in 
*reload4j* [(https://reload4j.qos.ch/|https://reload4j.qos.ch/]) artifacts with 
actual security fixes.  This seems like a better mitigation since the 
avro-tools jar will not bundle current (and future) known CVE.

I think the long-term solution is to adopt downstream projects that include 
log4j2 security and performance improvements as soon as they are available (in 
this case, Hadoop), _or_ alternatively modify the tool to only work with files 
on the local filesystem.

> avro-tools Update log4j dependency for critical vulnerability
> -------------------------------------------------------------
>
>                 Key: AVRO-3304
>                 URL: https://issues.apache.org/jira/browse/AVRO-3304
>             Project: Apache Avro
>          Issue Type: Task
>          Components: tools
>    Affects Versions: 1.11.0
>            Reporter: Daniel Nash
>            Assignee: Ryan Skraba
>            Priority: Major
>              Labels: pull-request-available
>          Time Spent: 1h 10m
>  Remaining Estimate: 0h
>
> Our company security is having a fit because Nessus scans are triggering on 
> the bundled log4j in the avro-tools.jar.  Please update the log4j 
> dependencies to the latest versions to remove the critical vulnerability 
> present in the currently bundled log4j.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to