The SLF4J API is just an API which lets message data go through. As such, using log4j 2.x even via SLF4J does not mitigate the vulnerability.
However, as mentioned previously, log4j 1.x is safe with respect to CVE-2021-44228. Thus, if your SLF4J provider/binding is slf4j-logj12.jar, you are safe regarding CVE-2021-44228.
If you are using log4j-over-slf4j.jar with SLF4J API, you are safe unless the underlying implementation is log4j 2.x.
--
You received this message because you are subscribed to the Google Groups "go-cd" group.
To unsubscribe from this group and stop receiving emails from it, send an email to go-cd+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/go-cd/a1cc672b-e9d5-4496-86c6-35b173cba8dcn%40googlegroups.com.
Hello Pranav,
No, I can’t confirm that, because I haven’t looked into any old versions. After 21.3.0 came out, it doesn’t make sense to be on any older version, since anything less than 21.2.0 was directly vulnerable in a very bad way.
My opinion is that 20.6.0 is not vulnerable to this, since the log4j v1 to slf4j + logback change was done in 2016, as mentioned in the GitHub discussion: https://github.com/gocd/gocd/discussions/9931
Regards,
Aravind
To view this discussion on the web visit https://groups.google.com/d/msgid/go-cd/m2v8zsa9hd.fsf%40arvindsv.com.