Is there any reason to use log4j instead of java.util.logging these days? If log4j is only use in one place in the NetBeans codebase, it might be beneficial to get rid of it in any case--one less dependency, and fewer overlapping logging libraries.
-- Eirik -----Original Message----- From: Matthias Bläsing <mblaes...@doppel-helix.eu.INVALID> Sent: Thursday, March 23, 2023 2:48 PM To: dev@netbeans.apache.org Subject: Re: log4j Hi, Am Donnerstag, dem 23.03.2023 um 09:53 -0400 schrieb William Shackleford: > Netbeans appears to include log4j even the most recent version. > > in > > netbeans/ide/modules/ext/log4j-1.2.15.jar > > Our IT security group has flagged it and requires that it be removed > even though as it is version 1 it is not vulnerable to the most famous > issue as apparently there were other issues and it is no longer supported. > > What are the consequences of removing it? If I saw it correctly, log4j is used by the html validator only. Anything that calls into that might break. That also might happen indirectly. > > How would I go about committing or just suggestion a change to have > it removed from future versions Have a look at the html.parser and html.validator modules. Both most probably need to be updated or might be patched not to carry log4j. Patching html.validator might be the quickest way, updates to current version might be better in the long run. The hard > to avoid triggering our security team from telling everyone to delete > it and maybe all of netbeans with it? The alternative is: Solve organisational problems inside the organisation. If the security team indeed has the misconception that "has log4j === is vulnerable", than you might need a new security team. My status on the CVEs: - CVE-2019-17571: SocketServer needs to be explicitly loaded, we are not vulnerable - CVE-2020-9488: We don't use the SMTPAppender, we are not vulnerable - CVE-2021-4104: We don't use the JMSAppender, we are not vulnerabe - CVE-2022-23302: We don't use the JMSSink, we are not vulnerable - CVE-2022-23305: We don't use the JDBCAppender, we are not vulnerable - CVE-2022-23307: Apache Chainsaw is not used Greetings Matthias --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@netbeans.apache.org For additional commands, e-mail: dev-h...@netbeans.apache.org For further information about the NetBeans mailing lists, visit: https://cwiki.apache.org/confluence/display/NETBEANS/Mailing+lists --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@netbeans.apache.org For additional commands, e-mail: dev-h...@netbeans.apache.org For further information about the NetBeans mailing lists, visit: https://cwiki.apache.org/confluence/display/NETBEANS/Mailing+lists