<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: log4j vulnerability in Installing and Upgrading</title>
    <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407022#M11364</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are waiting for a patch fixing this issue (TOS version 8.0.1). The last update of the article &lt;A href="https://www.talend.com/security/incident-response/" alt="https://www.talend.com/security/incident-response/" target="_blank"&gt;https://www.talend.com/security/incident-response/&lt;/A&gt; was three weeks ago. The only information regarding a patch for TOS is "Remediation for Talend Open Source is not in scope". Are there any information when a patch for TOS approximately is beeing released?&lt;/P&gt;</description>
    <pubDate>Thu, 10 Feb 2022 11:55:43 GMT</pubDate>
    <dc:creator>dtxstg</dc:creator>
    <dc:date>2022-02-10T11:55:43Z</dc:date>
    <item>
      <title>log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407012#M11354</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;is Talend BD 6.4.1 affected at all by the log4j vulnerability problem?&lt;/P&gt;&lt;P&gt;The Talend installation and workspace directories only contain older versions log4j-1.2.15.jar and log4j-1.2.16.jar.&lt;/P&gt;&lt;P&gt;The log4j problem affects only log4j versions higher than 2.0.&lt;/P&gt;&lt;P&gt;So am I correct that Talend BD 6.4.1 is not affected?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 23:25:22 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407012#M11354</guid>
      <dc:creator>SZollikofer</dc:creator>
      <dc:date>2024-11-15T23:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407013#M11355</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Same question for Talend ESB 7.3.1 regarding this official announcement  : https://logging.apache.org/log4j/2.x/security.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And if yes what is the procedure to upgrade the version (not talend just log4j)&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 15:47:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407013#M11355</guid>
      <dc:creator>JSD03</dc:creator>
      <dc:date>2021-12-13T15:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407014#M11356</link>
      <description>&lt;P&gt;My security team is asking the same questions. We are running Talend Cloud Big Data 7.3.1 with Talend Studio 7.3.1 and I would like to understand our exposure to this vulnerability.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 20:58:50 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407014#M11356</guid>
      <dc:creator>MikeBender27</dc:creator>
      <dc:date>2021-12-13T20:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407015#M11357</link>
      <description>&lt;P&gt;We are preparing migration to 7.3.1 and we are waiting also news and recommandation from Talend&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:29:17 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407015#M11357</guid>
      <dc:creator>lfr</dc:creator>
      <dc:date>2021-12-14T12:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407016#M11358</link>
      <description>&lt;P&gt;Hi all, I'd like to draw your attention to this page on the vulnerability....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;https://www.talend.com/security/incident-response/&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 21:50:15 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407016#M11358</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-12-15T21:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407017#M11359</link>
      <description>&lt;P&gt;Yes good: we have applied this fix on our system but since a new log4j vulnerability has been published today : https://nvd.nist.gov/vuln/detail/CVE-2021-45046. Do you have a new workaround ?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 15:37:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407017#M11359</guid>
      <dc:creator>JSD03</dc:creator>
      <dc:date>2021-12-16T15:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407018#M11360</link>
      <description>&lt;P&gt;Just to be clear, the document linked to above does not list fixes, it lists ways to mitigate for this issue until patches are ready. I have spoken to our Support team and have been informed that the incident-response page is being updated as we speak.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 16:07:17 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407018#M11360</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-12-16T16:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407019#M11361</link>
      <description>&lt;P&gt;OK thanks for the clarification&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 16:23:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407019#M11361</guid>
      <dc:creator>JSD03</dc:creator>
      <dc:date>2021-12-16T16:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407020#M11362</link>
      <description>&lt;P&gt;Mitigation is NOT remediation. A company like Talend should know this. I suspect they do and just do not care.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 15:02:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407020#M11362</guid>
      <dc:creator>seaferring</dc:creator>
      <dc:date>2022-02-07T15:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407021#M11363</link>
      <description>&lt;P&gt;Hi @Malcolm O'Callaghan​,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you take a look at the page I pointed to (https://www.talend.com/security/incident-response/) you will see that patches or upgrades have been released for all of our subscription products. The mitigation steps were added to allow people to make their environments as safe as possible while the R&amp;amp;D work was taking place on the patches. These were released as soon as possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some of the many benefits of using the subscription product are that it comes with support, upgrades and patches. The Open Studio product does not. Due to this, there is no "patch" implementation functionality built-in to it. To upgrade, you need to take a new version. When the new version is released, it will contain all of the fixes to these Apache Log4j issues. If you would like to receive the benefit of patches, upgrades and support, I can arrange for one of our sales team to contact you. Please let me know if this is a route that you'd like to take.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Richard &lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 15:23:46 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407021#M11363</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-02-07T15:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407022#M11364</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are waiting for a patch fixing this issue (TOS version 8.0.1). The last update of the article &lt;A href="https://www.talend.com/security/incident-response/" alt="https://www.talend.com/security/incident-response/" target="_blank"&gt;https://www.talend.com/security/incident-response/&lt;/A&gt; was three weeks ago. The only information regarding a patch for TOS is "Remediation for Talend Open Source is not in scope". Are there any information when a patch for TOS approximately is beeing released?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 11:55:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407022#M11364</guid>
      <dc:creator>dtxstg</dc:creator>
      <dc:date>2022-02-10T11:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407023#M11365</link>
      <description>&lt;P&gt;I'm afraid a patch for TOS will not be released. It will be fixed in the next version. There are certain mitigation steps you can follow in the article you linked to.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 15:30:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407023#M11365</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-02-10T15:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407024#M11366</link>
      <description>&lt;P&gt;@Richard Hall​&amp;nbsp; Thank you for your fast reply.  Is it foreseeable when the next Version of TOS is beeing released?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 16:35:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407024#M11366</guid>
      <dc:creator>dtxstg</dc:creator>
      <dc:date>2022-02-10T16:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407025#M11367</link>
      <description>&lt;P&gt;Hi @Marc Veitinger​,,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not currently aware of the schedule for the next release, but I have put a couple of questions out to our R&amp;amp;D team. When I get a response, I will update. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I should point out that they may not have this set in stone as yet since we have only just released v8. If that is the case, it may take a while before I can confirm a period.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 18:35:57 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability/m-p/2407025#M11367</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-02-10T18:35:57Z</dc:date>
    </item>
  </channel>
</rss>

