-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update log4j to 2.15.0 to address security vulnerabilities #12051
Conversation
@xvrl You're so quick. Why can't I find the 2.15.0 artifact on the mvnrepository.com? |
it probably hasn't propagated to all of the mirrors yet, I see it here https://search.maven.org/search?q=g:org.apache.logging.log4j |
Not sure if we know at this point if 2.15.0 will completely resolve this issue, but operators must be setting |
log4j's official announcement is here https://lists.apache.org/thread/bfnl1stql187jytr0t5k0hv0go6b76g4 Based on this, operators could add |
Thanks for clarifying @suneet-s |
Thank you all! |
@xvrl , @clintropolis , Is this going to get updated to 2.16 to mitigate CVE-2021-45046? |
@GElkayam I checked the description of that CVE. If I understand correctly, this vulnerability exists when thread context map pattern layout is applied. Since Druid's default log4j2 configuration does not use such pattern layout, I think it's not affected by this problem.
|
…ilities Summary: Druid is running with JVM 1.8.0_232 but log4j 2.5 so it's P1 rather than p0. Pull upstream to upgrade log4j to 2.15.0 to address security vulnerabilities Changes are from the following upstream PRs: # Upgrade log4j from 2.8.2 to 2.15.0 apache#12051 apache#12056 # Upgrade log4j from 2.5 to 2.8.2 apache#8878 Reviewers: O1139 Druid, jgu, itallam Reviewed By: O1139 Druid, jgu, itallam Subscribers: jenkins, shawncao, #realtime-analytics Differential Revision: https://phabricator.pinadmin.com/D823708
fixes #12050