<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869805</link>
    <description>&lt;P&gt;Qlik GeoAnalytics Server and the&amp;nbsp;&lt;SPAN class="mc-variable CommonComponents.CompanyName variable"&gt;Qlik&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;GeoAnalytics Connector in combination with GeoAnalytics Plus are both affected by the log4j vulnerability. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Patches are available. See &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_self"&gt;Vulnerability Testing - Apache Log4j, reference CVE-2021-44228 (also referred to as Log4Shell) &lt;/A&gt;&amp;nbsp;for your release of Qlik GeoAnalytics and the relevant patch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Upgrade at the earliest.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Mitigation steps are provided below should not upgrade be possible at this time.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;The Standard GeoAnalytics Connector for Qlikview and QlikSense (bundled)&amp;nbsp;&lt;EM&gt;without GeoAnalytics Plus are&lt;/EM&gt;&amp;nbsp;not affected by it, they don't use Java.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik GeoAnalytics" id="qlikGeoAnalytics"&gt;&lt;/LI-PRODUCT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution for GeoAnalytics Server:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Start the &lt;STRONG&gt;Configure Service&lt;/STRONG&gt; application from the start menu.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sebastian_Linser_1-1639404259009.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68486i464652DED2B1CE16/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Sebastian_Linser_1-1639404259009.png" alt="Sebastian_Linser_1-1639404259009.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Set the Java options&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;&lt;STRONG style="font-family: inherit;"&gt;‐Dlog4j2.formatMsgNoLookups=true &lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;inside the Service Properties under the Java tab.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sebastian_Linser_0-1639404031447.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68485iAFC23210A7F44EA7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Sebastian_Linser_0-1639404031447.png" alt="Sebastian_Linser_0-1639404031447.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart all GeoAnalytics Services.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution for GeoAnalytics Plus Connector:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open &lt;FONT face="courier new,courier"&gt;C:\Program Files\Common Files\Qlik\Custom Data\QvIdevioConnector\IdevioGeoAnalyticsConnector.exe.config&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;Locate the following line (located in appSettings)&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;&lt;SPAN&gt;&amp;lt;add key="javaArgs" value=""/&amp;gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Change the line to:&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;&lt;SPAN&gt;&amp;lt;add key="javaArgs" value="-Dlog4j2.formatMsgNoLookups=true"/&amp;gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This applies only to GeoAnalytics Plus Connector Version May 2021 and higher.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Versions prior to February 2020 uses Log4j v1,&amp;nbsp;which is not vulnerable to this exploit. To prevent any other possible vulnerabilities, we recommend upgrading to a newer version (higher than May 2021) of GeoAnalytics Plus and then applying the mitigation.&lt;/P&gt;
&lt;P&gt;Alternatively, you can manually replace the Log4j library files with newer versions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Download the binaries of the latest release of Log4j2 (2.17.1 as of this&amp;nbsp; moment):&amp;nbsp;&amp;nbsp;&lt;A tabindex="-1" title="https://logging.apache.org/log4j/2.x/download.html" href="https://logging.apache.org/log4j/2.x/download.html" target="_blank" rel="noopener noreferrer" aria-label="Link https://logging.apache.org/log4j/2.x/download.html"&gt;https://logging.apache.org/log4j/2.x/download.html&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Extract the files&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT face="courier new,courier"&gt;C:\Program Files\Common Files\Qlik\Custom Data\QvIdevioConnector\lib&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;For all JAR files starting with "lib4j-"
&lt;OL class="lia-list-style-type-lower-alpha"&gt;
&lt;LI&gt;Copy the corresponding 2.17.1 JAR file to the lib folder&lt;/LI&gt;
&lt;LI&gt;Delete the old version of that JAR&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a short update we released:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;GeoAnalytics Server - 4.32.5 - (November 2021 SR3) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Server - 4.19.2 - 4.27.4 (February 2020 SR2 - May 2021 SR2) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.31.3 ( November 2021 SR3) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.29.5-5.30.2 (May 2021 SR3 - August 2021 SR2) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.27.6-5.28.3 (November 2020 SR2-February 2021 SR2) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.26.6 (September 2020 SR3) - 2.17.1&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;GeoAnalytics Server - 4.32.4 - (November 2021 SR2) - 2.17.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Server - 4.32.3 - (November 2021 SR1) - 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Server - 4.19.1 - 4.27.3(February 2020 SR1 - May 2021 SR1) - 2.16.0&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.31.2 ( November 2021 SR2) - 2.17.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.31.1 ( November 2021 SR1) - 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.29.4-5.30.1 (May 2021 SR2 - August 2021 SR1)&amp;nbsp;- 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.27.5-5.28.2 (November 2020 SR1-February 2021 SR1)&amp;nbsp;- 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.26.5 (September 2020 SR2)&amp;nbsp;- 2.16.0&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Thu, 27 Jan 2022 09:13:15 GMT</pubDate>
    <dc:creator>Sebastian_Linser</dc:creator>
    <dc:date>2022-01-27T09:13:15Z</dc:date>
    <item>
      <title>CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869805</link>
      <description>&lt;P&gt;Qlik GeoAnalytics Server and the&amp;nbsp;&lt;SPAN class="mc-variable CommonComponents.CompanyName variable"&gt;Qlik&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;GeoAnalytics Connector in combination with GeoAnalytics Plus are both affected by the log4j vulnerability. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Patches are available. See &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_self"&gt;Vulnerability Testing - Apache Log4j, reference CVE-2021-44228 (also referred to as Log4Shell) &lt;/A&gt;&amp;nbsp;for your release of Qlik GeoAnalytics and the relevant patch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Upgrade at the earliest.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Mitigation steps are provided below should not upgrade be possible at this time.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;The Standard GeoAnalytics Connector for Qlikview and QlikSense (bundled)&amp;nbsp;&lt;EM&gt;without GeoAnalytics Plus are&lt;/EM&gt;&amp;nbsp;not affected by it, they don't use Java.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik GeoAnalytics" id="qlikGeoAnalytics"&gt;&lt;/LI-PRODUCT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution for GeoAnalytics Server:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Start the &lt;STRONG&gt;Configure Service&lt;/STRONG&gt; application from the start menu.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sebastian_Linser_1-1639404259009.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68486i464652DED2B1CE16/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Sebastian_Linser_1-1639404259009.png" alt="Sebastian_Linser_1-1639404259009.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Set the Java options&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;&lt;STRONG style="font-family: inherit;"&gt;‐Dlog4j2.formatMsgNoLookups=true &lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;inside the Service Properties under the Java tab.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sebastian_Linser_0-1639404031447.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68485iAFC23210A7F44EA7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Sebastian_Linser_0-1639404031447.png" alt="Sebastian_Linser_0-1639404031447.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart all GeoAnalytics Services.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution for GeoAnalytics Plus Connector:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open &lt;FONT face="courier new,courier"&gt;C:\Program Files\Common Files\Qlik\Custom Data\QvIdevioConnector\IdevioGeoAnalyticsConnector.exe.config&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;Locate the following line (located in appSettings)&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;&lt;SPAN&gt;&amp;lt;add key="javaArgs" value=""/&amp;gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Change the line to:&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;&lt;SPAN&gt;&amp;lt;add key="javaArgs" value="-Dlog4j2.formatMsgNoLookups=true"/&amp;gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This applies only to GeoAnalytics Plus Connector Version May 2021 and higher.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Versions prior to February 2020 uses Log4j v1,&amp;nbsp;which is not vulnerable to this exploit. To prevent any other possible vulnerabilities, we recommend upgrading to a newer version (higher than May 2021) of GeoAnalytics Plus and then applying the mitigation.&lt;/P&gt;
&lt;P&gt;Alternatively, you can manually replace the Log4j library files with newer versions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Download the binaries of the latest release of Log4j2 (2.17.1 as of this&amp;nbsp; moment):&amp;nbsp;&amp;nbsp;&lt;A tabindex="-1" title="https://logging.apache.org/log4j/2.x/download.html" href="https://logging.apache.org/log4j/2.x/download.html" target="_blank" rel="noopener noreferrer" aria-label="Link https://logging.apache.org/log4j/2.x/download.html"&gt;https://logging.apache.org/log4j/2.x/download.html&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Extract the files&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT face="courier new,courier"&gt;C:\Program Files\Common Files\Qlik\Custom Data\QvIdevioConnector\lib&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;For all JAR files starting with "lib4j-"
&lt;OL class="lia-list-style-type-lower-alpha"&gt;
&lt;LI&gt;Copy the corresponding 2.17.1 JAR file to the lib folder&lt;/LI&gt;
&lt;LI&gt;Delete the old version of that JAR&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a short update we released:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;GeoAnalytics Server - 4.32.5 - (November 2021 SR3) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Server - 4.19.2 - 4.27.4 (February 2020 SR2 - May 2021 SR2) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.31.3 ( November 2021 SR3) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.29.5-5.30.2 (May 2021 SR3 - August 2021 SR2) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.27.6-5.28.3 (November 2020 SR2-February 2021 SR2) - 2.17.1&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.26.6 (September 2020 SR3) - 2.17.1&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;GeoAnalytics Server - 4.32.4 - (November 2021 SR2) - 2.17.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Server - 4.32.3 - (November 2021 SR1) - 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Server - 4.19.1 - 4.27.3(February 2020 SR1 - May 2021 SR1) - 2.16.0&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.31.2 ( November 2021 SR2) - 2.17.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.31.1 ( November 2021 SR1) - 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.29.4-5.30.1 (May 2021 SR2 - August 2021 SR1)&amp;nbsp;- 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.27.5-5.28.2 (November 2020 SR1-February 2021 SR1)&amp;nbsp;- 2.16.0&lt;/LI&gt;
&lt;LI&gt;GeoAnalytics Plus - 5.26.5 (September 2020 SR2)&amp;nbsp;- 2.16.0&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 27 Jan 2022 09:13:15 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869805</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2022-01-27T09:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870118#M5021</link>
      <description>&lt;P&gt;Does either or both of these fixes require outage at any point, i.e. service restarts?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 04:57:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870118#M5021</guid>
      <dc:creator>hermandup_anz</dc:creator>
      <dc:date>2021-12-14T04:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870143#M5023</link>
      <description>&lt;P&gt;We are running Geo Analytics Server November 2018.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does this change apply. Any info on whats supported and whats not?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Aadil&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 06:12:11 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870143#M5023</guid>
      <dc:creator>aadil_madarveet</dc:creator>
      <dc:date>2021-12-14T06:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870154#M5025</link>
      <description>&lt;P&gt;Can we still expect a patch?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 07:10:55 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870154#M5025</guid>
      <dc:creator>JohannaR</dc:creator>
      <dc:date>2021-12-14T07:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870197#M5028</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/43596"&gt;@hermandup_anz&lt;/a&gt;:&lt;BR /&gt;The GA Server fix requires a restart of its service in order to apply.&lt;BR /&gt;The GA Plus fix similarly requires a restart if it is running. It will keep running in the background for a while after being used so you can open the process explorer and look for a matching Java process and kill that.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/35709"&gt;@aadil_madarveet&lt;/a&gt;:&lt;BR /&gt;GA Server Nov 2018 doesn't use Log4j 2 (we switched to ), it is using Log4j 1 so it is not vulnerable to this specific bug.&lt;BR /&gt;It is however quite outdated and might have other vulnerabilities in its dependencies so I would really recommend updating anyway.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/83512"&gt;@JohannaR&lt;/a&gt;:&lt;BR /&gt;We will focus on getting patches out for the latest versions first, and then go backwards (mainly since the earlier versions will need a bunch of build related changes backported which will require some work).&lt;BR /&gt;The first patches should be out by tomorrow at least.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 08:44:23 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870197#M5028</guid>
      <dc:creator>KallePersson</dc:creator>
      <dc:date>2021-12-14T08:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870212#M5029</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/24678"&gt;@KallePersson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you know from which version of GeoAnalytics the switch to Log4j 2 was made?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 09:04:09 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870212#M5029</guid>
      <dc:creator>jfkinspari</dc:creator>
      <dc:date>2021-12-14T09:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870213#M5030</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/18630"&gt;@jfkinspari&lt;/a&gt;we switched to Log4j2 in the February 2020 release of both GeoAnalytics Server and GeoAnalytics Plus.&lt;BR /&gt;I see that I forgot to add that to the post above.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 09:09:11 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870213#M5030</guid>
      <dc:creator>KallePersson</dc:creator>
      <dc:date>2021-12-14T09:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870249#M5032</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If there is no&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;&amp;lt;add key="javaArgs" value=""/&amp;gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;line in config file , it need to be added ? If yes to which section ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 10:04:31 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870249#M5032</guid>
      <dc:creator>janyf</dc:creator>
      <dc:date>2021-12-14T10:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870292#M5033</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/139151"&gt;@janyf&lt;/a&gt;&amp;nbsp;which version are you using? it would come in the appsettings section between &amp;lt;appsettings&amp;gt; and &amp;lt;/appsettings&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 10:52:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870292#M5033</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2021-12-14T10:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870293#M5034</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/139151"&gt;@janyf&lt;/a&gt;:&lt;BR /&gt;The option only works on GeoAnalytics Plus from the May 2021 version and onwards. I will ask the support team to update the page.&lt;/P&gt;&lt;P&gt;The recommended solution would be to upgrade to a newer version of GeoAnalytics Plus and then apply the mitigation.&lt;BR /&gt;You could also manually replace the Log4j library files with newer versions:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Download the binaries of the latest release of Log4j2 (2.16 as of this&amp;nbsp; moment):&amp;nbsp; &lt;A href="https://logging.apache.org/log4j/2.x/download.html" target="_blank"&gt;https://logging.apache.org/log4j/2.x/download.html&lt;/A&gt; and extract somewhere&lt;/LI&gt;&lt;LI&gt;Go to &lt;FONT face="andale mono,times"&gt;C:\Program Files\Common Files\Qlik\Custom Data\QvIdevioConnector\lib&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;For all JAR files starting with "lib4j-"&lt;OL&gt;&lt;LI&gt;Copy the corresponding 2.16 JAR file to the lib folder&lt;/LI&gt;&lt;LI&gt;Delete the old version of that JAR&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 14 Dec 2021 10:54:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870293#M5034</guid>
      <dc:creator>KallePersson</dc:creator>
      <dc:date>2021-12-14T10:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870338#M5037</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/24678"&gt;@KallePersson&lt;/a&gt;&amp;nbsp;it is slightly confusing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is library&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="janyf_0-1639483176129.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68553i424DB542180B8912/image-size/medium?v=v2&amp;amp;px=400" role="button" title="janyf_0-1639483176129.png" alt="janyf_0-1639483176129.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;but this is version when i run the connector :&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="janyf_1-1639483224396.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68554i7063902963AFDD02/image-size/medium?v=v2&amp;amp;px=400" role="button" title="janyf_1-1639483224396.png" alt="janyf_1-1639483224396.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;so it is possible we are not affected somehow (as there is still old lib)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;brgds&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:01:01 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870338#M5037</guid>
      <dc:creator>janyf</dc:creator>
      <dc:date>2021-12-14T12:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870369#M5043</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/139151"&gt;@janyf&lt;/a&gt;Yes, that is Log4j 1 so it is safe from this vulnerability at least.&lt;BR /&gt;It is quite old though so I recommend that you upgrade GeoAnalytics Plus when we&amp;nbsp; have a proper patched release out. But you should be ok for now.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:43:18 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870369#M5043</guid>
      <dc:creator>KallePersson</dc:creator>
      <dc:date>2021-12-14T12:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870411#M5045</link>
      <description>&lt;P&gt;Can I upgrade GeoAnalytics Plus to May 2021 or newer version regardless of GeoAnalytics Server or GA for Qlik Sense version?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 14:15:56 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870411#M5045</guid>
      <dc:creator>aki_martiskaine</dc:creator>
      <dc:date>2021-12-14T14:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870634#M5054</link>
      <description>&lt;P&gt;We're using the Qlik GeoAnalytics version February 2020 (5.20.1) together with QlikView April 2019 SR3.&lt;/P&gt;
&lt;P&gt;Since this GeoAnalytics version is affected and we're planning updating in early 2022 and you suggested updating in general.&lt;/P&gt;
&lt;P&gt;Will GeoAnalytics May 2021 have any issues with the older QlikView&amp;nbsp; April 2019 SR3?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 16:26:27 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870634#M5054</guid>
      <dc:creator>senior_v</dc:creator>
      <dc:date>2021-12-14T16:26:27Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871078#M5067</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/68450"&gt;@senior_v&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use Qlikview April 2019 with May 2021 even November 2021 see here&lt;/P&gt;
&lt;P&gt;&lt;A href="https://help.qlik.com/en-US/geoanalytics/Subsystems/GeoChangelogQV/Content/qlikview/qlikview-changelog.htm" target="_blank"&gt;https://help.qlik.com/en-US/geoanalytics/Subsystems/GeoChangelogQV/Content/qlikview/qlikview-changelog.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For Sense it's September 2019 or newer&lt;/P&gt;
&lt;P&gt;&lt;A href="https://help.qlik.com/en-US/geoanalytics/Subsystems/GeoChangelogS/Content/qliksense/qliksense-changelog.htm" target="_blank"&gt;https://help.qlik.com/en-US/geoanalytics/Subsystems/GeoChangelogS/Content/qliksense/qliksense-changelog.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 18:25:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871078#M5067</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2021-12-14T18:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871847#M5088</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/19162"&gt;@Sebastian_Linser&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks, that's good news!&lt;/P&gt;
&lt;P&gt;So we will update and go with log4j 2.16 (&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" target="_blank"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046&lt;/A&gt;) to mitigate the risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 08:39:01 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871847#M5088</guid>
      <dc:creator>senior_v</dc:creator>
      <dc:date>2021-12-16T08:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871860#M5089</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/19162"&gt;@Sebastian_Linser&lt;/a&gt;&amp;nbsp;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customer has a GeoQlik Server Version installed. Is there also an action needed due to the current Log4J Bug?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Serkan_0-1639644742709.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68693i9BCD3F8CAC38F349/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Serkan_0-1639644742709.png" alt="Serkan_0-1639644742709.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Here is also an screenshot about the log4j version:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Serkan_1-1639644833437.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68694i6ED3E2A4DAAE09CC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Serkan_1-1639644833437.png" alt="Serkan_1-1639644833437.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Serkan_2-1639644863684.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68696i90EC54840083F333/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Serkan_2-1639644863684.png" alt="Serkan_2-1639644863684.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is in use with QlikView. What is your recommendation to do ?&lt;/P&gt;
&lt;P&gt;Thanks for your feedback.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 08:55:26 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871860#M5089</guid>
      <dc:creator>Serkan</dc:creator>
      <dc:date>2021-12-16T08:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871875#M5090</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/30295"&gt;@Serkan&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Qlik is working on a patch for the GeoAnalytics server, for the moment you can only use the workaround with the additional parameter in the Java Settings.&lt;/P&gt;
&lt;TABLE width="96%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="38%"&gt;
&lt;P&gt;GeoAnalytics Server - 4.32.3&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="35%"&gt;
&lt;P&gt;Log4J Upgrade to 2.16.0&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="25%"&gt;
&lt;P&gt;Late December&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="38%"&gt;
&lt;P&gt;GeoAnalytics Server - 4.27.3 - 4.19.1&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="35%"&gt;
&lt;P&gt;Log4J Upgrade to 2.16.0&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="25%"&gt;
&lt;P&gt;Late December&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 16 Dec 2021 09:17:39 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871875#M5090</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2021-12-16T09:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871903#M5096</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/30295"&gt;@Serkan&lt;/a&gt;&amp;nbsp; one more update here. A Patch for GeoAnalytics Server 5.3 has been released and it includes the 2.16 libraries already. Just go tot he download page and get the latest release (Nov2021 SR1)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Sebastian_Linser_0-1639647810523.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/68703iEC4173AA53E42BF5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Sebastian_Linser_0-1639647810523.png" alt="Sebastian_Linser_0-1639647810523.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 09:44:08 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1871903#M5096</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2021-12-16T09:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik GeoAnalytics</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873267#M5131</link>
      <description>&lt;P&gt;As of last weekend it came out that log4j 2.16 doesn't mitigate the security flaw totally. log4j 2.17 seems to completly remove the feature.&lt;/P&gt;
&lt;P&gt;Is there any update to 2.17 planned?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 12:26:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873267#M5131</guid>
      <dc:creator>senior_v</dc:creator>
      <dc:date>2021-12-20T12:26:53Z</dc:date>
    </item>
  </channel>
</rss>

