A major security exploit has come to light that can have some severe consequences in a number of Minecraft releases/softwares going back years - a number of patches are being dropped to fix this where it is needed, which we will push to our systems as soon as we get the chance to do so.
Currently the following options on our jar list have had patches released for this security exploit:
- Spigot 1.8.8.
- Spigot 1.9.4.
- Spigot 1.10.2.
- Spigot 1.11.2.
- Spigot 1.12.2.
- Spigot 1.13.2.
- Spigot 1.14.4.
- Spigot 1.15.2 (with or without Aikar flags).
- Spigot 1.16.5 (with or without Aikar flags).
- Spigot 1.17.1 (with or without Aikar flags).
- Spigot 1.18 (with or without Aikar flags).
- PaperSpigot 1.16.5 (with or without Aikar flags).
- PaperSpigot 1.17.1 (with or without Aikar flags).
- PaperSpigot 1.18 (with or without Aikar flags).
- Waterfall.
- Velocity 3.*.
- Vanilla 1.18.1 Release Candidate.
If you use these options please update them ASAP by deleting the jar folder from the server files and restart the server to update to the patched builds.
Note that PaperSpigot are not backporting the fix for their 1.8-1.15.2 builds, by their own choice as these versions are not supported. If you are using these versions and do not require PaperSpigot we would either suggest using Spigot on the latest build with the security fix, or update to PaperSpigot 1.17.1/1.18 as soon as your server can be updated.
BungeeCord does not require the fix for the exploit. Whether other softwares/versions require patching, or if the above startup parameter is enough by itself, is uncertain at this time but we will update anything that releases a patch for the exploit ASAP, and all servers should update the moment they can!
To confirm - What you should be doing regarding this issue:
- Update your server jar if a build has been released to patch the exploit for the software you use.
- If you are on a heavily outdated server version, consider updating to a supported server version that is patched.
- Restart your server to make sure the above parameter is in effect if you are using an option it is now applied to.
- For players/clients using the default Minecraft launcher - fully close and relaunch it, a patch has been issued for 1.12.2+ clients. Note that this may not auto-apply if your launcher is modded, you will need to run the Minecraft version without mods to be sure you get the patch. For other launchers you will need to check their updates/support etc... to see if they have pushed a patch yet.
- Where applicable use the plugins here, as they protect your players from the exploit as well if their client has not been patched to fix it their end yet:
https://github.com/FrankHeijden/Log4jFix/releases/
Currently the following options on our jar list have had patches released for this security exploit:
- Spigot 1.8.8.
- Spigot 1.9.4.
- Spigot 1.10.2.
- Spigot 1.11.2.
- Spigot 1.12.2.
- Spigot 1.13.2.
- Spigot 1.14.4.
- Spigot 1.15.2 (with or without Aikar flags).
- Spigot 1.16.5 (with or without Aikar flags).
- Spigot 1.17.1 (with or without Aikar flags).
- Spigot 1.18 (with or without Aikar flags).
- PaperSpigot 1.16.5 (with or without Aikar flags).
- PaperSpigot 1.17.1 (with or without Aikar flags).
- PaperSpigot 1.18 (with or without Aikar flags).
- Waterfall.
- Velocity 3.*.
- Vanilla 1.18.1 Release Candidate.
If you use these options please update them ASAP by deleting the jar folder from the server files and restart the server to update to the patched builds.
Note that PaperSpigot are not backporting the fix for their 1.8-1.15.2 builds, by their own choice as these versions are not supported. If you are using these versions and do not require PaperSpigot we would either suggest using Spigot on the latest build with the security fix, or update to PaperSpigot 1.17.1/1.18 as soon as your server can be updated.
BungeeCord does not require the fix for the exploit. Whether other softwares/versions require patching, or if the above startup parameter is enough by itself, is uncertain at this time but we will update anything that releases a patch for the exploit ASAP, and all servers should update the moment they can!
To confirm - What you should be doing regarding this issue:
- Update your server jar if a build has been released to patch the exploit for the software you use.
- If you are on a heavily outdated server version, consider updating to a supported server version that is patched.
- Restart your server to make sure the above parameter is in effect if you are using an option it is now applied to.
- For players/clients using the default Minecraft launcher - fully close and relaunch it, a patch has been issued for 1.12.2+ clients. Note that this may not auto-apply if your launcher is modded, you will need to run the Minecraft version without mods to be sure you get the patch. For other launchers you will need to check their updates/support etc... to see if they have pushed a patch yet.
- Where applicable use the plugins here, as they protect your players from the exploit as well if their client has not been patched to fix it their end yet:
https://github.com/FrankHeijden/Log4jFix/releases/
Last edited: