<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log4j Vulnerability issue in Installing and Upgrading</title>
    <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j-Vulnerability-issue/m-p/2407058#M11378</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;For your Log4j Vulnerability mitigation updated issue, could you please contact our support team so that we could give you a remote assistance through support cycle with priority.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
    <pubDate>Fri, 17 Dec 2021 07:31:47 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2021-12-17T07:31:47Z</dc:date>
    <item>
      <title>Log4j Vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j-Vulnerability-issue/m-p/2407057#M11377</link>
      <description>&lt;P&gt;Hi we have gone through the steps to prevent the log4j vulnerability issue. But we are confused about the files where we need to introduce the commands there are almost 180+ log4j files in the installation folder of talend. Do we need to add the line of code which talend have provided in the solution  all these files or only for the necessary file. If its for the necessary file kindly share the file name to add these commands&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 23:24:25 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j-Vulnerability-issue/m-p/2407057#M11377</guid>
      <dc:creator>Shashank1</dc:creator>
      <dc:date>2024-11-15T23:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j Vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j-Vulnerability-issue/m-p/2407058#M11378</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;For your Log4j Vulnerability mitigation updated issue, could you please contact our support team so that we could give you a remote assistance through support cycle with priority.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 07:31:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j-Vulnerability-issue/m-p/2407058#M11378</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-12-17T07:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j Vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j-Vulnerability-issue/m-p/2407059#M11379</link>
      <description>&lt;P&gt;Talend is working to identify all modules in Talend affected and is working on a permanent solution. We should be able to provide your team with an official in-depth update in the coming days on the status of this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One important note, Talend Cloud has been mitigated, along with all apps inside of itself (TMC, TDS/TDP, TDI, etc) and thus not affected by this CVE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For a detailed list of affected products and the suggested mitigation steps, please visit&lt;A href="https://www.talend.com/security/incident-response/" alt="https://www.talend.com/security/incident-response/" target="_blank"&gt; https://www.talend.com/security/incident-response/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 18:18:13 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j-Vulnerability-issue/m-p/2407059#M11379</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-12-17T18:18:13Z</dc:date>
    </item>
  </channel>
</rss>

