I have never used either Chainsaw or anything to do with Java serialization
of Log4j events. This said, you have my full support of ditching that
feature off from log4cxx – preferably in the next major release? Java
serialization, putting aside its good intentions, has been a generous
source of many security vulnerabilities.

On Sat, Sep 25, 2021 at 3:49 AM Robert Middleton <rmiddle...@apache.org>
wrote:

> I've been working on ABI compliance for log4cxx lately(LOGCXX-516),
> and I'm running across a few classes that have to do with sending log
> messages as Java serialized messages.  Since we've removed the ability
> to receive these messages through Chainsaw, and due to Java's known
> security issues with object deserialization, is there any reason in
> keeping this feature around?
>
> Note: I'm currently imagining that this would be for the next major
> release of log4cxx, which I wouldn't expect for at least another year.
> Whenever that release is, I expect that the release would break a lot
> of code, so removing the serialization at that time makes the most
> sense to me.
>
> -Robert Middleton
>

Reply via email to