We know it's been a crazy week for those tracking down which systems are vulnerable to recent log4j vulnerabilities.
As these questions continue to come up, here's a quick guide based on what we know
today.
Is DSpace vulnerable to CVE-2021-44228 (aka Log4Shell) in log4j v2?
- DSpace 7.0 & 7.1 are both vulnerable. Upgrade as soon as possible to 7.1.1 (or above) or patch your system. You also must upgrade/patch your Apache Solr. See 7.1.1 Release Notes for information: https://wiki.lyrasis.org/display/DSDOC7x/Release+Notes#ReleaseNotes-7.1.1ReleaseNotes(BackendOnly)
- DSpace 6.x, 5.x or 4.x (or below) are *not vulnerable*, as they all use log4j v1 exclusively with a default configuration which is not impacted. (At this time there is no way to upgrade these older DSpace releases to log4j v2. See below for more info.)
(Obviously, as this vulnerability is so new, it's possible there will be updates. We are closely watching everything coming out of the log4j community to ensure the DSpace can be updated as needed.)
Is DSpace vulnerable to CVE-2019-17571 critical vulnerability in log4j v1?
Can DSpace 6.x, 5.x or 4.x be upgraded to log4j v2? log4j v1 is EOL.
Unfortunately, log4j v2 is not backwards compatible with log4j v1. Therefore, this is not a simple upgrade (e.g. it took over 1,000 lines of code changes to update DSpace 7.x to log4j v2, see
PR 2241). This upgrade would likely be
more complex in DSpace 6.x/5.x/4.x, as those releases also used older versions of Apache Solr (and other dependencies) which relied on log4j v1 as well.
Overall, if you need to use log4j v2 more immediately, we'd recommend upgrading to DSpace 7.x. It's unlikely that earlier releases will ever support log4j v2. (All that said,
if anyone does find a way to upgrade earlier versions of DSpace to log4j v2, we'll be sure to let everyone know.)
If there are other questions, feel free to ask them on this list, or email
secu...@dspace.org.
Tim