Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mitigating log4j vulnerability in linkerd1 #2439

Closed
1 of 2 tasks
DrCapt opened this issue Dec 16, 2021 · 1 comment
Closed
1 of 2 tasks

Mitigating log4j vulnerability in linkerd1 #2439

DrCapt opened this issue Dec 16, 2021 · 1 comment

Comments

@DrCapt
Copy link

DrCapt commented Dec 16, 2021

Thanks for your help improving the project!

Getting Help

Github issues are for bug reports and feature requests. For questions about
Linkerd, how to use it, or debugging assistance, start by
asking a question in the forums or join us on
Slack.

Full details at CONTRIBUTING.md.

Filing a Linkerd issue

Issue Type:

  • Bug report
  • Feature request

What happened:
linkerd1 uses log4j, and it is conceivable that an attacker can use the JDNI vulnerability by putting malicious classloader directives in headers, and the headers can show up in logs. We need guidance on how to mitigate this vulnerability.

Thanks!

What you expected to happen:

How to reproduce it (as minimally and precisely as possible):

Anything else we need to know?:

Environment:

  • linkerd/namerd version, config files:

linkerd 1.7.3

  • Platform, version, and config files (Kubernetes, DC/OS, etc):
  • Cloud provider or hardware configuration:
@cpretzer
Copy link
Contributor

Hi @DrCapt , thanks for reaching out about this.

The Linkerd team has completed its analysis of the CVE and you can find the details in #2438 The short version is that we have found Linkerd to be safe from the CVE.

@adleong adleong closed this as completed Jan 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants