Comments (8)
Did you try to give java more memory by adding -Xmx1024m as command line parameter?
from log4j-detector.
Same on my Windows machine: java -jar log4j-detector-2021.12.13.jar c:\
Exception in thread "main" java.lang.OutOfMemoryError: Java heap space
at com.mergebase.log4j.Bytes.resizeArray(Bytes.java:93)
at com.mergebase.log4j.Bytes.streamToBytes(Bytes.java:56)
at com.mergebase.log4j.Bytes.streamToBytes(Bytes.java:43)
at com.mergebase.log4j.Log4JDetector.findLog4jRecursive(Log4JDetector.java:153)
at com.mergebase.log4j.Log4JDetector.scan(Log4JDetector.java:312)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:337)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.main(Log4JDetector.java:72)
from log4j-detector.
Sorry, same problem. It needs some more time to crash now.
I used the following call: java -jar -Xmx1024m log4j-detector-2021.12.13.jar c:\
Exception in thread "main" java.lang.OutOfMemoryError: Java heap space
at com.mergebase.log4j.Bytes.resizeArray(Bytes.java:93)
at com.mergebase.log4j.Bytes.streamToBytes(Bytes.java:56)
at com.mergebase.log4j.Bytes.streamToBytes(Bytes.java:43)
at com.mergebase.log4j.Log4JDetector.findLog4jRecursive(Log4JDetector.java:153)
at com.mergebase.log4j.Log4JDetector.scan(Log4JDetector.java:312)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:337)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.analyze(Log4JDetector.java:333)
at com.mergebase.log4j.Log4JDetector.main(Log4JDetector.java:72)
I think/hope the option --verbose has no impact to the problem.
from log4j-detector.
Use this to avoid out of memory errors:
java -jar -Xmx1024m log4j-detector-2021.12.13.jar --verbose
from log4j-detector.
No! I will try it...
Thx!
from log4j-detector.
I limited the available memory to 1GB using the command
java -jar -Xmx1024m log4j-detector-2021.12.13.jar --verbose /home/\<username\>
. I can can confirm @aveXcaesar 's observation, that it now fails more quickly. The --verbose
flag made no difference.
The failure happened while traversing a particular file that had more than 100MB in size.
from log4j-detector.
That make sense. With ´--verbose´ I can see that the last logged file as a size of 133MB.
from log4j-detector.
I added the Pull Request above to further improve OutOfMemory Handling ... Please fell free to share feedback :-)
from log4j-detector.
Related Issues (20)
- Detection of potentially safe log4j 1.x after manual mitigation HOT 1
- fix --exclude example in README HOT 4
- Shaded Log4j class JndiLookup not found HOT 7
- java.util.zip.ZipException: invalid entry size (expected 0 but got 622 bytes) HOT 4
- version 2021.12.20 not redirecting output anymore (in Windows) HOT 1
- Simple test using sample files outputs no status HOT 10
- Detection of Log4j 1.x as vulnerable HOT 5
- great idea but can be enhanced
- Some archives are not detected when using Java 8
- Scan OSGI .kar and .par archives HOT 1
- Scan .car files HOT 1
- New log4j 2.17.0 CVE that can lead to RCE HOT 1
- log4j CVEs
- Output fixing / adjustment HOT 2
- IDEA: Show a _SAFE_ when nothing found
- Don't handle *.gwtar and other normal files ending with *ar as archives HOT 2
- Incomplete pathnames HOT 1
- Weird new File("blah") in nextByte HOT 3
- Exploded jar not detected under Windows
- reload4j raised as log4j-1.x vulnerability
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from log4j-detector.