I didn't hear about this until the IT team at my job lost their minds yesterday, begging everyone to run a script ASAP to update Log4j. I've looked into it and it looks bad, to say the least. I don't have the technological literacy to answer these questions, so if anyone here knows the answer, please, lend a hand:
1. What should I, someone who runs no java-based servers and sells no java-based software, be doing right now? Should I be purging every program that runs java from my PC? Is there anything I can do to avoid being compromised, or is that out of my control until there's an unexploited Log4j update? None of the techno-journos are putting solutions in terms that the technologically illiterate can understand, it seems like they're all just flexing their cybersecurity terminology instead.
2. If this is as bad as techno-journos are implying, where the fuck is the mainstream media coverage? If I were a journo, the front page would be filled with what this exploit is, why it took so long for it to be noticed, and how this will have negative ramifications for years to come. The fearmongering would bring in mountains of revenue. Are regular journos just too braindead to understand the severity, or am I the braindead one for overreacting?
3. Isn't this kind of damning for the security of open source that people gush about so much? This has been in the wild since 2013, and the vulnerability was only just reported now. It seems to me that a bad actor trying to distribute malware has way more incentive to look for vulnerabilities in open source software and keep quiet about it, while a good faith programmer gets no money from combing through open source software and can easily assume that someone else will find an issue. Doesn't common sense and the tragedy of commons suggest that open source software is more vulnerable than paid software developed by a company that will lose money if they get compromised?