Hi David Ballano Fernandez,

Thanks for reporting this issue. Yes, this is the most critical 0-day
vulnerability for security members.
I've been investigating this CVE for a while, and I confirmed that* log4j
1.x versions are not affected by this vulnerability.*
That is, *Kafka, which is using log4j 1.x, is not affected by this
vulnerability*.
So, users can safely use Kafka without worries! :)

REF: Here, the PMC of log4j 2 comment on the PR to fix the vulnerability
here
<https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126>
and said:

*Update (2021-12-11 09:09 JST): according to this analysis
<https://twitter.com/ceki/status/1469449618316533762> by @ceki
<https://github.com/ceki> (the author of log4j 1.x), Log4j 1.x is not
impacted, since it does not have lookups, and the JMS Appender only loads
Strings from the remote server, not serialized objects.*

That is, log4j 1 is actually another project from log4j 2, and the author
of the log4j 1 confirmed log4j 1 is not impacted by this vulnerability!

Thank you
*.*
Luke

On Sat, Dec 11, 2021 at 6:42 AM David Ballano Fernandez <
dfernan...@demonware.net> wrote:

> Hi All,
>
> I wonder if you guys have heard about this vulnerability
> https://www.randori.com/blog/cve-2021-44228/  affecting log4j v1 and v2
> as far as i can see kafka 2.7 and 2.8 are using log4j v1. which is only
> affected if using jms appender.
>
> any thoughts?
>
> Thanks!
>

Reply via email to