You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _posts/2021-12-16-state-of-log4j-in-scala-ecosystem.md
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ For further technical guidance, see [Guidance for preventing, detecting, and hun
13
13
14
14
A project is affected by the log4j vulnerabilities if it contains a vulnerable version of a log4j artifact on its classpath.
15
15
16
-
You may find below a non-comprenhensive list of core Scala tools and libraries known to be affected by the vulnerability, and in which version (if any) it is addressed.
16
+
You may find below a non-comprehensive list of core Scala tools and libraries known to be affected by the vulnerability, and in which version (if any) it is addressed.
17
17
18
18
We also give some useful tasks and settings to address the vulnerabilities in applications built with sbt, Mill or Maven.
19
19
@@ -24,7 +24,7 @@ We also give some useful tasks and settings to address the vulnerabilities in ap
24
24
The following information is provided AS IS, without any warranty of any kind, for your convenience.
25
25
A proper security assessment of any CVE, including the log4j vulnerabilities, remains your sole responsibility.
26
26
27
-
### Affected tools and libraries with fix available
27
+
### Affected tools and libraries with an available fix
28
28
29
29
The following core tools and libraries have versions affected by the log4j vulnerability, but have published newer versions with the appropriate patches.
30
30
It is recommended that you upgrade to these versions as soon as possible.
@@ -38,28 +38,28 @@ If this is not possible, for libraries, see the tip below on how to force the de
38
38
| sbt | 1.x < 1.5.7 | 1.5.7 |
39
39
40
40
Log4j is not enabled by default since sbt 1.4.0, but all users are recommended to upgrade to the latest fixed version.
41
-
Any organization using sbt as part of CI/CD (continuous integration and delivery), automated publishing, and projects that expose TCP/IP entry point during testing may be most vulnerable to an exploit.
41
+
Any organization using sbt as part of CI/CD (continuous integration and delivery), automated publishing, and projects that expose a TCP/IP entry point during testing may be most vulnerable to an exploit.
42
42
43
43
#### Libraries
44
44
45
45
| Organization | Artifact name | Fixed in version |
### Affected tools and libraries without known fix available
49
+
### Affected tools and libraries without a known available fix
50
50
51
51
The following core tools and libraries are affected by the log4j vulnerability, and have not yet published an updated version with the appropriate patches.
52
52
Consult the CVEs to use any other applicable mitigation that may apply in your case.
53
53
54
-
It may also be possible to force the dependency of log4j, as explained above.
54
+
It may also be possible to force the dependency of log4j, as explained below.
55
55
56
56
| Organization | Artifact name |
57
57
|--------------|---------------|
58
58
| none known so far ||
59
59
60
60
## Useful sbt tasks and settings
61
61
62
-
If your application is built with sbt, which is common in the Scala ecosystem, here are some information on how to determine the classpath of your application, and how to force an upgrade of the log4j dependencies.
62
+
If your application is built with sbt, which is common in the Scala ecosystem, here is some information on how to determine the classpath of your application, and how to force an upgrade of the log4j dependencies.
0 commit comments