You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@pulsar.apache.org by GitBox <gi...@apache.org> on 2021/12/10 17:39:33 UTC

[GitHub] [pulsar] lhotari commented on pull request #13231: [Issue 13232]Remote code injection in Log4j: Avoid a remote code execution vulnerability via the ldap JNDI parser.

lhotari commented on pull request #13231:
URL: https://github.com/apache/pulsar/pull/13231#issuecomment-991165677


   The system property workaround is useful for existing versions. 
   I have posted information about a mitigation for Log4Shell on the mailing list: https://lists.apache.org/thread/pf8wfzt09c2dv4z291httlgdwtc1495c
   https://lists.apache.org/thread/dbcy49yjsm6qtmxws2zf6zogv8yylq4c


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscribe@pulsar.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org