<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979 in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495835#M29166</link>
    <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;can you check with R&amp;amp;D on this.&amp;nbsp; The CVE is rated as high.&amp;nbsp; From what I am seeing in the qlik forum post below, unbundling postgres is not supported, so we cannot resolve with Qlik releasing a patch.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Qlik-NPrinting/External-NPrinting-Repository/td-p/1788527" target="_blank"&gt;https://community.qlik.com/t5/Qlik-NPrinting/External-NPrinting-Repository/td-p/1788527&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Dec 2024 15:50:35 GMT</pubDate>
    <dc:creator>jeremyseipel</dc:creator>
    <dc:date>2024-12-03T15:50:35Z</dc:date>
    <item>
      <title>PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2493838#M29164</link>
      <description>&lt;P&gt;Hi everybody,&lt;/P&gt;
&lt;P&gt;I came accross thi security issue that affects the bundled Postgre included into Qlik Sense May 2024.(version 14.8)&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;A href="https://www.cve.org/CVERecord?id=CVE-2024-10979" target="_self"&gt;CVE-2024-10979&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;I'd like to know if a security patch will be released to fix the issue or if there is any suggestion to face the problem.&lt;/P&gt;
&lt;P&gt;The only idea I have is to unbundle the database and upgrade it to the last patch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the support&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 16:21:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2493838#M29164</guid>
      <dc:creator>Ced_Eural</dc:creator>
      <dc:date>2025-01-29T16:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495835#M29166</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;can you check with R&amp;amp;D on this.&amp;nbsp; The CVE is rated as high.&amp;nbsp; From what I am seeing in the qlik forum post below, unbundling postgres is not supported, so we cannot resolve with Qlik releasing a patch.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Qlik-NPrinting/External-NPrinting-Repository/td-p/1788527" target="_blank"&gt;https://community.qlik.com/t5/Qlik-NPrinting/External-NPrinting-Repository/td-p/1788527&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 15:50:35 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495835#M29166</guid>
      <dc:creator>jeremyseipel</dc:creator>
      <dc:date>2024-12-03T15:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495923#M29167</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/236135"&gt;@Ced_Eural&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45167"&gt;@jeremyseipel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Qlik Sense Enterprise on Windows, unbundle PostgreSQL. This will allow you to upgrade it independently of the Qlik Sense Enterprise on Windows release schedule. Though please review the System Requirements to ensure your currently used version supports the PostgreSQL version you plan to upgrade to.&lt;/P&gt;
&lt;P&gt;As for Qlik NPrinting,&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/236135"&gt;@Ced_Eural&lt;/a&gt;, a case may be needed to investigate further, but I've also contacted my contacts internally.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 08:18:08 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495923#M29167</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2024-12-04T08:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495978#M29168</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45167"&gt;@jeremyseipel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please open a support ticket regarding&amp;nbsp;&lt;SPAN&gt;CVE-2024-10979 in combination with Qlik NPrinting (not Qlik Sense Enterprise on Windows). This will get the correct pieces moving.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 12:37:59 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495978#M29168</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2024-12-04T12:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495988#M29169</link>
      <description>&lt;P&gt;Thanks Sonja.&amp;nbsp; A member of my team has a case open for this.&amp;nbsp; Just wanted to make sure it got additional traction and others like us searching didn't find a thread with no answers.&lt;/P&gt;
&lt;P&gt;I am curious as to why unlike qlik sense, the db cannot be unlinked.&amp;nbsp; Since NP doesn't support high availability there hasn't been a real reason to do it, unless a client had a mandate of using RDS over local postgres, which I haven't encountered.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 13:16:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495988#M29169</guid>
      <dc:creator>jeremyseipel</dc:creator>
      <dc:date>2024-12-04T13:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495990#M29170</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45167"&gt;@jeremyseipel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the heads-up! I located the case.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 13:24:39 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2495990#M29170</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2024-12-04T13:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496010#M29171</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45167"&gt;@jeremyseipel&lt;/a&gt;&amp;nbsp;the R&amp;amp;D team responsible for NPrinting is also responsible for the Tabular Reporting in Qlik Cloud, since they are focused on that I don't anticipate new features or architectural changes to NPrinting &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 14:58:28 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496010#M29171</guid>
      <dc:creator>David_Friend</dc:creator>
      <dc:date>2024-12-04T14:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496013#M29172</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Upgrading-and-unbundling-the-Qlik-Sense-Repository-Database/ta-p/1934238" target="_blank"&gt;https://community.qlik.com/t5/Official-Support-Articles/Upgrading-and-unbundling-the-Qlik-Sense-Repository-Database/ta-p/1934238&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;into the Known limitation says:&lt;/P&gt;
&lt;P&gt;"Cannot migrate a 14.8 embedded&amp;nbsp;database to a standalone"&lt;/P&gt;
&lt;P&gt;I'm running&amp;nbsp;&lt;SPAN&gt;Qlik Sense May 2024.(Postgresql version 14.8)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can I use the&amp;nbsp;&lt;SPAN&gt;Qlik Sense PostgreSQL installer to install a new instance , manually migrate the DB and then update the postgre?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is there any guide to follow?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for your help&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 15:16:57 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496013#M29172</guid>
      <dc:creator>Ced_Eural</dc:creator>
      <dc:date>2024-12-04T15:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496014#M29173</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/58383"&gt;@David_Friend&lt;/a&gt;&amp;nbsp;totally understand and unfortunately I agree, I don't expect major changes to NPrinting either.&amp;nbsp; As long as we get a fix for this asap, then I think we are good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I saw that Qlik just released information about a major vulnerability for Qlik sense that requires an upgrade, so it looks like it will be a busy few weeks for upgrades.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 15:17:42 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496014#M29173</guid>
      <dc:creator>jeremyseipel</dc:creator>
      <dc:date>2024-12-04T15:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496884#M29174</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp; or&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/58383"&gt;@David_Friend&lt;/a&gt;&amp;nbsp; any word on a patch update from Qlik to resolve this issue for NP?&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 14:00:56 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496884#M29174</guid>
      <dc:creator>jeremyseipel</dc:creator>
      <dc:date>2024-12-09T14:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496887#M29175</link>
      <description>&lt;P&gt;what is your case number?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 14:03:34 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496887#M29175</guid>
      <dc:creator>David_Friend</dc:creator>
      <dc:date>2024-12-09T14:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496890#M29176</link>
      <description>&lt;P&gt;00332802: Qlik NPrinting Patching for Postgres Vulnerability CVE-2024-10979&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 14:06:59 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496890#M29176</guid>
      <dc:creator>jeremyseipel</dc:creator>
      <dc:date>2024-12-09T14:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496914#M29177</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45167"&gt;@jeremyseipel&lt;/a&gt;&amp;nbsp;there is not an update from R&amp;amp;D in this yet.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 15:29:20 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2496914#M29177</guid>
      <dc:creator>David_Friend</dc:creator>
      <dc:date>2024-12-09T15:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: PostgreSQL vulnerability Nov 2024 CVE-2024-10979</title>
      <link>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2497004#M29178</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45167"&gt;@jeremyseipel&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We're actively working on this request. Please keep an eye on the Qlik NPrinting release notes for details. The ID for this investigation is&amp;nbsp;QB-30635.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 08:00:32 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/PostgreSQL-vulnerability-Nov-2024-CVE-2024-10979/m-p/2497004#M29178</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2024-12-10T08:00:32Z</dc:date>
    </item>
  </channel>
</rss>

