Summary of Log4j Use in LI‑COR Software
Like many software applications, LI‑COR software uses a third-party library from the Apache Software Foundation called "Log4j". Log4j is code that provides an efficient way for software applications to record important software operations, which is a critical part of almost all software applications.
Recently, security vulnerabilities were discovered in some versions of Log4j (CVE-2021-45105, CVE-2021-45046, CVE-2021-44832, CVE-2021-44228). Although Empiria Studio® Software and LI‑COR® Acquisition Software do use affected versions of Log4j, LI‑COR engineers have determined that the use of Log4j in Empiria Studio and LI‑COR Acquisition does not constitute a security problem for computers that have not already been compromised in some other way. If you keep your computer safe following appropriate security measures, the use of Log4j in Empiria Studio and LI‑COR Acquisition does not pose a security risk.
Out of an abundance of caution, new versions of Empiria Studio and LI‑COR Acquisition will be released at the end of January 2022 with a new version of Log4j that does not have the vulnerabilities.
More Detail
The software applications listed below use Log4j. The applications either do not use the vulnerable features of Log4j or the use of Log4j in the application does not pose a problem for computers that have not already been compromised.
CVE | Empiria Studio Software | LI‑COR Acquisition Software | Image Studio Software |
---|---|---|---|
CVE-2021-45105 | This vulnerability requires the use of Thread Context Map. Empiria Studio does not use Thread Context Map. | This vulnerability requires the use of Thread Context Map. LI‑COR Acquisition does not use Thread Context Map. | This vulnerability requires the use of Thread Context Map. Image Studio does not use Thread Context Map. |
CVE-2021-45046 | This vulnerability requires the use of Thread Context Map. Empiria Studio does not use Thread Context Map. | This vulnerability requires the use of Thread Context Map. LI‑COR Acquisition does not use Thread Context Map. | This vulnerability requires the use of Thread Context Map. Image Studio does not use Thread Context Map. |
CVE-2021-44832 | This vulnerability requires the use of JDBC Appender. Empiria Studio does not use JDBC Appender. | This vulnerability requires the use of JDBC Appender. LI‑COR Acquisition does not use JDBC Appender. | This vulnerability requires the use of JDBC Appender. Image Studio does not use JDBC Appender. |
CVE-2021-44228 | The use of Log4j in Empiria Studio does not pose a problem for computers that have not already been compromised. | The use of Log4j in LI‑COR Acquisition does not pose a problem for computers that have not already been compromised. | Uses a version of Log4j that does not contain the CVE-2021-44228 vulnerability. |
Third-Party Library Definition
The term "third-party library" refers to code that is included in a software application but that was written by someone other than the primary developer of the software application. Third-party libraries are created to perform functions that are common to many software applications so that the functions do not have to be re-developed in each software application that needs to perform the function. Developers include third-party libraries in their software applications so that they can focus on developing unique features for the people who use their software.
It is a standard practice in the software industry to use third-party libraries.