Skip to content

Commit 410e021

Browse files
committed
Added note about CVE-2021-4428.
1 parent 06c828e commit 410e021

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

README.md

+6
Original file line numberDiff line numberDiff line change
@@ -21,3 +21,9 @@ within a release series. It uses a variant of the X.Y.Z
2121
log4sh was originally hosted on Source Forge as
2222
https://sourceforge.net/p/log4sh/. It moved here in Sep 2017 to be hosted
2323
alongside the other projects by @kward (https://github.com/kward).
24+
25+
**[2021-12-12]** log4sh ***is not*** Log4Shell. log4sh is written in pure shell
26+
code, and does not use Java in any way, shape, or form. It is therefore ***not
27+
vulnerable*** to the Log4j exploit mentioned in [CVE-2021-4428](https://www.cve.org/CVERecord?id=CVE-2021-44228), which is also named
28+
Log4Shell or LogJam. For more information, about the unrelated exploit, see
29+
https://www.kaspersky.com/blog/log4shell-critical-vulnerability-in-apache-log4j/43124/.

0 commit comments

Comments
 (0)