Hallo Justin,

Thank You for the clarification.
Of course I understand that there is no immediate vulnerability risk.
Nevertheless the widespread use of the component and the sensitivity of the 
security community on this issue must not to be underestimated.
Therefore a timely release of version 5.17 with updated log4j would help to 
reduce some uncertainties.

Best Regards
Ralf

Von: Justin Bertram <[email protected]<mailto:[email protected]>>
Gesendet: Donnerstag, 13. Januar 2022 21:59
An: [email protected]<mailto:[email protected]>
Cc: [email protected]<mailto:[email protected]>; Riechmann, Thomas 
<[email protected]<mailto:[email protected]>>; Höck, Ulrich 
<[email protected]<mailto:[email protected]>>
Betreff: Re: Call for action - vulnerability (CVE-2021-44228,CVE-2019-17571) - 
Active MQ classic


Caution! External email. Do not open attachments or click links, unless this 
email comes from a known sender and you know the content is safe.
> The official statement "the latest versions (i.e. 5.15.15 and 5.16.3) use 
> Log4j 1.2.17 which is not impacted by CVE-2021-44228" is not accepted, as 
> Log4j 1.2.17 has not been maintained since August 2015.

The "official statement" [1] that you reference is only dealing with 
CVE-2021-44228. It's not a general statement about all the security 
vulnerabilities in Log4j 1.2.17. It remains a fact that Log4j 1.2.17 is not 
impacted by CVE-2021-44228.

> Here an existing security vulnerability, (CVE-2019-17571) is not fixed with 
> the note "Users are urged to upgrade to Log4j 2".

Regarding CVE-2019-17571 you can read more on this Jira [2]. In short, as noted 
by Jean-Baptiste Onofré, "ActiveMQ is not affected as it doesn't use the 
SocketServer. However, I think it makes sense to update/support log4j2..." 
AMQ-7426 [3] was later created to track the work to upgrade to Log4j 2.

> This situation will not be accepted by a number of large customers, which 
> demand a timely exchange of this component to the officially released new 
> Log4j version 2.

Since you've sent this email to the public Apache ActiveMQ mailing lists you're 
dealing with "community support" as described on the ActiveMQ website [4]. As 
noted, this support is provided on a volunteer basis. Furthermore, in the 
spirit of open-source, all community members are encouraged (although certainly 
not required) to get involved. As noted in a recent position paper [5] from the 
Apache Software Foundation, "Community is defined by those who show up and do 
the work." I would strongly encourage your organization, as an "intensive user 
of the Apache technology," to avail itself of *all* the benefits of open 
source. With your help to "do the work" this issue could potentially have been 
resolved long ago.

> Therefore we ask you kindly to name and communicate an official release date 
> for ActiveMQ 5.17.0 (including the Log4j version 2).

Given the volunteer nature of community support and how open-source works at 
Apache I'm not sure "an official release date" can be provided, at least not 
like you'd expect from a commercial software vendor. As noted on the users 
mailing list as well as the Log4j 2 upgrade PR [6] (linked from the 
aforementioned statement about CVE-2021-44228 [1]), the current plan is to put 
a release up for vote at the end of January. All community members can vote on 
the release for 3 days, and if the vote passes then the release should be done 
in early February.

I hope that helps!


Justin

[1] https://activemq.apache.org/news/cve-2021-44228
[2] https://issues.apache.org/jira/browse/AMQ-7370
[3] https://issues.apache.org/jira/browse/AMQ-7426
[4] https://activemq.apache.org/support
[5] https://cwiki.apache.org/confluence/display/COMDEV/Position+Paper
[6] https://github.com/apache/activemq/pull/662

On Thu, Jan 13, 2022 at 2:09 PM Knöringer, Ralf 
<[email protected]<mailto:[email protected]>> 
wrote:
To whom it may concern,



as a intensive user of the Apache technology in our enterprise architecture and 
product portfolio I may draw your attention to a critical issue.

Based on the known vulnerability CVE-2021-44228 in the Log4j Version 2 many of 
our large enterprise customers (e.g. Volkswagen Financial Services) are 
becoming very sensitive for the risk of using software elements not under 
maintenance.



Unfortunately we have this situation with the message broker ActiveMQ "Classic" 
(the latest versions 5.15.15 and 5.16.3) as there is an embedded use of the 
Log4j version 1.2.17.



The official statement "the latest versions (i.e. 5.15.15 and 5.16.3) use Log4j 
1.2.17 which is not impacted by CVE-2021-44228" is not accepted, as Log4j 
1.2.17 has not been maintained since August 2015.

(Here an existing security vulnerability, (CVE-2019-17571) is not fixed with 
the note "Users are urged to upgrade to Log4j 2".)



This situation will not be accepted by a number of large customers, which 
demand a timely exchange of this component to the officially released new Log4j 
version 2.

Therefore we ask you kindly to name and communicate an official release date 
for ActiveMQ 5.17.0 (including the Log4j version 2).



A timely answer is really appreciated as we think this could mitigate negative 
responses and create a positive feedback from the market.



Best regards

Ralf Knöringer
Senior Manager
Big Data & Cybersecurity - IAM
M: +49 172 5229705
Otto-Hahn-Ring 6, 81739 Munich - Germany
atos.net<http://atos.net><https://atos.net/>

Atos Information Technology GmbH; Geschäftsführung: Udo Littke, Boris Hecker; 
Vorsitzender des Aufsichtsrats: N.N.; Sitz der Gesellschaft: München; 
Registergericht: Amtsgericht München, HRB 235509
Atos Information Technology GmbH; Managing Directors: Udo Littke, Boris Hecker; 
Chairman of the Supervisory Board: N.N.; Registered office: Munich; Commercial 
register of the local court of Munich, HRB 235509
Important notice: This e-mail and any attachment thereof contain corporate 
proprietary information. If you have received it by mistake, please notify us 
immediately by reply e-mail and delete this e-mail and its attachments from 
your system. Thank you.

Reply via email to