Hi

Big thank to Justin for the complete answer. Nothing to add, just again thanks 
to Justin ;)

And yes log4j2 upgrade PR will be ok soon, towards 5.17.0 vote. 

Regards 
JB

> Le 13 janv. 2022 à 21:59, Justin Bertram <jbert...@apache.org> a écrit :
> 
> 
>> 
>> The official statement "the latest versions (i.e. 5.15.15 and 5.16.3) use
> Log4j 1.2.17 which is not impacted by CVE-2021-44228" is not accepted, as
> Log4j 1.2.17 has not been maintained since August 2015.
> 
> The "official statement" [1] that you reference is only dealing with
> CVE-2021-44228. It's not a general statement about all the security
> vulnerabilities in Log4j 1.2.17. It remains a fact that Log4j 1.2.17 is not
> impacted by CVE-2021-44228.
> 
>> Here an existing security vulnerability, (CVE-2019-17571) is not fixed
> with the note "Users are urged to upgrade to Log4j 2".
> 
> Regarding CVE-2019-17571 you can read more on this Jira [2]. In short, as
> noted by Jean-Baptiste Onofré, "ActiveMQ is not affected as it doesn't use
> the SocketServer. However, I think it makes sense to update/support
> log4j2..." AMQ-7426 [3] was later created to track the work to upgrade to
> Log4j 2.
> 
>> This situation will not be accepted by a number of large customers, which
> demand a timely exchange of this component to the officially released new
> Log4j version 2.
> 
> Since you've sent this email to the public Apache ActiveMQ mailing lists
> you're dealing with "community support" as described on the ActiveMQ
> website [4]. As noted, this support is provided on a volunteer basis.
> Furthermore, in the spirit of open-source, all community members are
> encouraged (although certainly not required) to get involved. As noted in a
> recent position paper [5] from the Apache Software Foundation, "Community
> is defined by those who show up and do the work." I would strongly
> encourage your organization, as an "intensive user of the Apache
> technology," to avail itself of *all* the benefits of open source. With
> your help to "do the work" this issue could potentially have been resolved
> long ago.
> 
>> Therefore we ask you kindly to name and communicate an official release
> date for ActiveMQ 5.17.0 (including the Log4j version 2).
> 
> Given the volunteer nature of community support and how open-source works
> at Apache I'm not sure "an official release date" can be provided, at least
> not like you'd expect from a commercial software vendor. As noted on the
> users mailing list as well as the Log4j 2 upgrade PR [6] (linked from the
> aforementioned statement about CVE-2021-44228 [1]), the current plan is to
> put a release up for vote at the end of January. All community members can
> vote on the release for 3 days, and if the vote passes then the release
> should be done in early February.
> 
> I hope that helps!
> 
> 
> Justin
> 
> [1] https://activemq.apache.org/news/cve-2021-44228
> [2] https://issues.apache.org/jira/browse/AMQ-7370
> [3] https://issues.apache.org/jira/browse/AMQ-7426
> [4] https://activemq.apache.org/support
> [5] https://cwiki.apache.org/confluence/display/COMDEV/Position+Paper
> [6] https://github.com/apache/activemq/pull/662
> 
>> On Thu, Jan 13, 2022 at 2:09 PM Knöringer, Ralf
>> <ralf.knoerin...@atos.net.invalid> wrote:
>> 
>> To whom it may concern,
>> 
>> 
>> 
>> as a intensive user of the Apache technology in our enterprise
>> architecture and product portfolio I may draw your attention to a critical
>> issue.
>> 
>> Based on the known vulnerability CVE-2021-44228 in the Log4j Version 2
>> many of our large enterprise customers (e.g. Volkswagen Financial Services)
>> are becoming very sensitive for the risk of using software elements not
>> under maintenance.
>> 
>> 
>> 
>> Unfortunately we have this situation with the message broker ActiveMQ
>> "Classic" (the latest versions 5.15.15 and 5.16.3) as there is an embedded
>> use of the Log4j version 1.2.17.
>> 
>> 
>> 
>> The official statement "the latest versions (i.e. 5.15.15 and 5.16.3) use
>> Log4j 1.2.17 which is not impacted by CVE-2021-44228" is not accepted, as
>> Log4j 1.2.17 has not been maintained since August 2015.
>> 
>> (Here an existing security vulnerability, (CVE-2019-17571) is not fixed
>> with the note "Users are urged to upgrade to Log4j 2".)
>> 
>> 
>> 
>> This situation will not be accepted by a number of large customers, which
>> demand a timely exchange of this component to the officially released new
>> Log4j version 2.
>> 
>> Therefore we ask you kindly to name and communicate an official release
>> date for ActiveMQ 5.17.0 (including the Log4j version 2).
>> 
>> 
>> 
>> A timely answer is really appreciated as we think this could mitigate
>> negative responses and create a positive feedback from the market.
>> 
>> 
>> 
>> Best regards
>> 
>> Ralf Knöringer
>> Senior Manager
>> Big Data & Cybersecurity - IAM
>> M: +49 172 5229705
>> Otto-Hahn-Ring 6, 81739 Munich - Germany
>> atos.net<https://atos.net/>
>> 
>> Atos Information Technology GmbH; Geschäftsführung: Udo Littke, Boris
>> Hecker; Vorsitzender des Aufsichtsrats: N.N.; Sitz der Gesellschaft:
>> München; Registergericht: Amtsgericht München, HRB 235509
>> Atos Information Technology GmbH; Managing Directors: Udo Littke, Boris
>> Hecker; Chairman of the Supervisory Board: N.N.; Registered office: Munich;
>> Commercial register of the local court of Munich, HRB 235509
>> Important notice: This e-mail and any attachment thereof contain corporate
>> proprietary information. If you have received it by mistake, please notify
>> us immediately by reply e-mail and delete this e-mail and its attachments
>> from your system. Thank you.
>> 
>> 

Reply via email to