You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@felix.apache.org by "Carsten Ziegeler (Jira)" <ji...@apache.org> on 2021/12/16 05:55:00 UTC

[jira] [Commented] (FELIX-6485) Prepare a public statement w.r.t Log4Shell's impact on Felix

    [ https://issues.apache.org/jira/browse/FELIX-6485?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17460428#comment-17460428 ] 

Carsten Ziegeler commented on FELIX-6485:
-----------------------------------------

I did a first pass and scanning the felix-dev git repo; I couldn't find any reference to a vulnerable log4j version being used

> Prepare a public statement w.r.t Log4Shell's impact on Felix
> ------------------------------------------------------------
>
>                 Key: FELIX-6485
>                 URL: https://issues.apache.org/jira/browse/FELIX-6485
>             Project: Felix
>          Issue Type: Task
>            Reporter: Nitin Gupta
>            Priority: Critical
>
> We need to assess what all felix modules and what versions of those are impacted (if they are, and how) by Log4Shell ([https://nvd.nist.gov/vuln/detail/CVE-2021-44228).]
>  
> It would be good to put out a public statement on the project page to state what all versions are not impacted and any mitigation (if needed) in case of versions that are impacted.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)