<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Log4J vulnerability check in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Log4J-vulnerability-check/m-p/1869342#M30076</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;At DPG Media we're doing a fulll check of our systems on the Log4J vulnerability.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/" target="_blank" rel="noopener"&gt;https://www.lunasec.io/docs/blog/log4j-zero-day/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;We find some references in your documentation to Log4J. Can you please verify that your service is not impacted by this vulnerability?&lt;/P&gt;
&lt;DIV id="1639227614.002300" class="c-virtual_list__item" tabindex="-1" role="listitem" data-qa="virtual-list-item"&gt;
&lt;DIV class="c-message_kit__background c-message_kit__background--hovered p-message_pane_message__message c-message_kit__message" role="presentation" data-qa="message_container" data-qa-unprocessed="false" data-qa-placeholder="false"&gt;
&lt;DIV class="c-message_kit__hover c-message_kit__hover--hovered" role="document" aria-roledescription="message" data-qa-hover="true"&gt;
&lt;DIV class="c-message_kit__actions c-message_kit__actions--default"&gt;
&lt;DIV class="c-message_kit__gutter"&gt;
&lt;DIV class="c-message_kit__gutter__right" role="presentation" data-qa="message_content"&gt;
&lt;DIV class="c-message_kit__blocks c-message_kit__blocks--rich_text"&gt;
&lt;DIV class="c-message__message_blocks c-message__message_blocks--rich_text"&gt;
&lt;DIV class="p-block_kit_renderer" data-qa="block-kit-renderer"&gt;
&lt;DIV class="p-block_kit_renderer__block_wrapper p-block_kit_renderer__block_wrapper--first"&gt;
&lt;DIV class="p-rich_text_block" dir="auto"&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;A class="c-link" tabindex="-1" href="https://help.qlik.com/en-US/catalog/November2021/Content/Resources/PDFs/QlikCatalog_November_2021_SingleNode_InstallGuide.pdf#page=21" target="_blank" rel="noopener noreferrer" data-stringify-link="https://help.qlik.com/en-US/catalog/November2021/Content/Resources/PDFs/QlikCatalog_November_2021_SingleNode_InstallGuide.pdf#page=21" data-sk="tooltip_parent" data-remove-tab-index="true" aria-describedby="sk-tooltip-12979"&gt;https://help.qlik.com/en-US/catalog/November2021/Content/Resources/PDFs/QlikCatalog_November_2021_SingleNode_InstallGuide.pdf#page=21&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="c-message_actions__container c-message__actions" role="group"&gt;
&lt;DIV class="c-message_actions__group" role="group" aria-label="Message shortcuts" data-qa="message-actions"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="1639227668.002500" class="c-virtual_list__item" tabindex="0" role="listitem" data-qa="virtual-list-item"&gt;
&lt;DIV class="c-message_kit__background p-message_pane_message__message c-message_kit__message" role="presentation" data-qa="message_container" data-qa-unprocessed="false" data-qa-placeholder="false"&gt;
&lt;DIV class="c-message_kit__hover" role="document" aria-roledescription="message" data-qa-hover="true"&gt;
&lt;DIV class="c-message_kit__actions c-message_kit__actions--above"&gt;
&lt;DIV class="c-message_kit__gutter"&gt;
&lt;DIV class="c-message_kit__gutter__right" role="presentation" data-qa="message_content"&gt;
&lt;DIV class="c-message_kit__blocks c-message_kit__blocks--rich_text"&gt;
&lt;DIV class="c-message__message_blocks c-message__message_blocks--rich_text"&gt;
&lt;DIV class="p-block_kit_renderer" data-qa="block-kit-renderer"&gt;
&lt;DIV class="p-block_kit_renderer__block_wrapper p-block_kit_renderer__block_wrapper--first"&gt;
&lt;DIV class="p-rich_text_block" dir="auto"&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;A class="c-link" tabindex="-1" href="https://help.qlik.com/en-US/search/?q=log4j" target="_blank" rel="noopener noreferrer" data-stringify-link="https://help.qlik.com/en-US/search/?q=log4j" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;https://help.qlik.com/en-US/search/?q=log4j&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;Kind regards,&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;Erik Dolstra&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;Product Owner Data Tooling DPG Media&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 29 Jan 2025 16:57:53 GMT</pubDate>
    <dc:creator>ErikDolstraDPGMedia</dc:creator>
    <dc:date>2025-01-29T16:57:53Z</dc:date>
    <item>
      <title>Log4J vulnerability check</title>
      <link>https://community.qlik.com/t5/Management-Governance/Log4J-vulnerability-check/m-p/1869342#M30076</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;At DPG Media we're doing a fulll check of our systems on the Log4J vulnerability.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/" target="_blank" rel="noopener"&gt;https://www.lunasec.io/docs/blog/log4j-zero-day/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;We find some references in your documentation to Log4J. Can you please verify that your service is not impacted by this vulnerability?&lt;/P&gt;
&lt;DIV id="1639227614.002300" class="c-virtual_list__item" tabindex="-1" role="listitem" data-qa="virtual-list-item"&gt;
&lt;DIV class="c-message_kit__background c-message_kit__background--hovered p-message_pane_message__message c-message_kit__message" role="presentation" data-qa="message_container" data-qa-unprocessed="false" data-qa-placeholder="false"&gt;
&lt;DIV class="c-message_kit__hover c-message_kit__hover--hovered" role="document" aria-roledescription="message" data-qa-hover="true"&gt;
&lt;DIV class="c-message_kit__actions c-message_kit__actions--default"&gt;
&lt;DIV class="c-message_kit__gutter"&gt;
&lt;DIV class="c-message_kit__gutter__right" role="presentation" data-qa="message_content"&gt;
&lt;DIV class="c-message_kit__blocks c-message_kit__blocks--rich_text"&gt;
&lt;DIV class="c-message__message_blocks c-message__message_blocks--rich_text"&gt;
&lt;DIV class="p-block_kit_renderer" data-qa="block-kit-renderer"&gt;
&lt;DIV class="p-block_kit_renderer__block_wrapper p-block_kit_renderer__block_wrapper--first"&gt;
&lt;DIV class="p-rich_text_block" dir="auto"&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;A class="c-link" tabindex="-1" href="https://help.qlik.com/en-US/catalog/November2021/Content/Resources/PDFs/QlikCatalog_November_2021_SingleNode_InstallGuide.pdf#page=21" target="_blank" rel="noopener noreferrer" data-stringify-link="https://help.qlik.com/en-US/catalog/November2021/Content/Resources/PDFs/QlikCatalog_November_2021_SingleNode_InstallGuide.pdf#page=21" data-sk="tooltip_parent" data-remove-tab-index="true" aria-describedby="sk-tooltip-12979"&gt;https://help.qlik.com/en-US/catalog/November2021/Content/Resources/PDFs/QlikCatalog_November_2021_SingleNode_InstallGuide.pdf#page=21&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="c-message_actions__container c-message__actions" role="group"&gt;
&lt;DIV class="c-message_actions__group" role="group" aria-label="Message shortcuts" data-qa="message-actions"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="1639227668.002500" class="c-virtual_list__item" tabindex="0" role="listitem" data-qa="virtual-list-item"&gt;
&lt;DIV class="c-message_kit__background p-message_pane_message__message c-message_kit__message" role="presentation" data-qa="message_container" data-qa-unprocessed="false" data-qa-placeholder="false"&gt;
&lt;DIV class="c-message_kit__hover" role="document" aria-roledescription="message" data-qa-hover="true"&gt;
&lt;DIV class="c-message_kit__actions c-message_kit__actions--above"&gt;
&lt;DIV class="c-message_kit__gutter"&gt;
&lt;DIV class="c-message_kit__gutter__right" role="presentation" data-qa="message_content"&gt;
&lt;DIV class="c-message_kit__blocks c-message_kit__blocks--rich_text"&gt;
&lt;DIV class="c-message__message_blocks c-message__message_blocks--rich_text"&gt;
&lt;DIV class="p-block_kit_renderer" data-qa="block-kit-renderer"&gt;
&lt;DIV class="p-block_kit_renderer__block_wrapper p-block_kit_renderer__block_wrapper--first"&gt;
&lt;DIV class="p-rich_text_block" dir="auto"&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;A class="c-link" tabindex="-1" href="https://help.qlik.com/en-US/search/?q=log4j" target="_blank" rel="noopener noreferrer" data-stringify-link="https://help.qlik.com/en-US/search/?q=log4j" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;https://help.qlik.com/en-US/search/?q=log4j&lt;/A&gt;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;Kind regards,&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;Erik Dolstra&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;Product Owner Data Tooling DPG Media&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 29 Jan 2025 16:57:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Log4J-vulnerability-check/m-p/1869342#M30076</guid>
      <dc:creator>ErikDolstraDPGMedia</dc:creator>
      <dc:date>2025-01-29T16:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Log4J vulnerability check</title>
      <link>https://community.qlik.com/t5/Management-Governance/Log4J-vulnerability-check/m-p/1869362#M30077</link>
      <description>&lt;P&gt;Hi Erik,&lt;BR /&gt;&lt;SPAN style="font-family: inherit;"&gt;Qlik is aware of the&amp;nbsp;recently&amp;nbsp;published security vulnerability&amp;nbsp;in&amp;nbsp;Apache Log4j, reference&amp;nbsp;CVE-2021-44228&amp;nbsp;(also referred to as&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Log4Shell&lt;/I&gt;&lt;SPAN style="font-family: inherit;"&gt;)&lt;/SPAN&gt;&lt;I&gt;.&lt;/I&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;As soon as the vulnerability was published, Qlik immediately began a security investigation to determine if and how Qlik’s products and services are impacted.&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Our preliminary investigations have confirmed that&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Client-managed&amp;nbsp;Qlik Sense Enterprise,&amp;nbsp;QlikView,&amp;nbsp;Nprinting&amp;nbsp;are confirmed as not including the vulnerable component. Other Qlik products are still under evaluation and patches will be made available as necessary.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Patrick&lt;BR /&gt;Director, CSO Experience Programs&lt;BR /&gt;Qlik&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 14:56:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Log4J-vulnerability-check/m-p/1869362#M30077</guid>
      <dc:creator>PatrickQ</dc:creator>
      <dc:date>2021-12-11T14:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Log4J vulnerability check</title>
      <link>https://community.qlik.com/t5/Management-Governance/Log4J-vulnerability-check/m-p/1869393#M30078</link>
      <description>&lt;P&gt;Ongoing updates will be posted to here:&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/bc-p/1869391#M1993" target="_blank"&gt;Vulnerability Testing - &amp;nbsp;Apache Log4j, reference&amp;nbsp;C... - Qlik Community - 1869368&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 17:13:54 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Log4J-vulnerability-check/m-p/1869393#M30078</guid>
      <dc:creator>PatrickQ</dc:creator>
      <dc:date>2021-12-11T17:13:54Z</dc:date>
    </item>
  </channel>
</rss>

