<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log4j2 Vulnerability [Talend 6.5] in Installing and Upgrading</title>
    <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j2-Vulnerability-Talend-6-5/m-p/2407139#M11405</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The mitigation steps are now located on help.talend.com: &lt;A href="https://document-link.us.cloud.talend.com/talend_log4j2_cve_statement?lang=en&amp;amp;version=latest&amp;amp;env=prd" alt="https://document-link.us.cloud.talend.com/talend_log4j2_cve_statement?lang=en&amp;amp;version=latest&amp;amp;env=prd" target="_blank"&gt;https://document-link.us.cloud.talend.com/talend_log4j2_cve_statement?lang=en&amp;amp;version=latest&amp;amp;env=prd&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which provides all the workarounds for studio.&lt;/P&gt;&lt;P&gt;The mitigation steps that we have described in the &lt;A href="https://help.talend.com/r/EeTpT8r7xmeq1HtTGQBqGA/zX7iWLX6GgxOAjJPlpXNYA" alt="https://help.talend.com/r/EeTpT8r7xmeq1HtTGQBqGA/zX7iWLX6GgxOAjJPlpXNYA" target="_blank"&gt;Talend Help Center&lt;/A&gt; apply to TOS as well.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
    <pubDate>Fri, 31 Dec 2021 06:47:47 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2021-12-31T06:47:47Z</dc:date>
    <item>
      <title>Log4j2 Vulnerability [Talend 6.5]</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j2-Vulnerability-Talend-6-5/m-p/2407137#M11403</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;there is a patch for Talend 6.5 for Log4j2 Vulnerability ?&lt;/P&gt;&lt;P&gt;the JAR to patch is &lt;/P&gt;&lt;P&gt;pax-logging-log4j2-1.10.1-TESB.jar &lt;/P&gt;&lt;P&gt;Best Regard&lt;/P&gt;&lt;P&gt;Wissem&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 23:23:07 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j2-Vulnerability-Talend-6-5/m-p/2407137#M11403</guid>
      <dc:creator>wissem1</dc:creator>
      <dc:date>2024-11-15T23:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j2 Vulnerability [Talend 6.5]</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j2-Vulnerability-Talend-6-5/m-p/2407138#M11404</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Currently supported products are our priority. End-of-Life versions will be evaluated once we have provided remediation and/or mitigation for supported Talend products. To determine if a version is supported or has reached its end-of-life, please refer to Talend's Product support lifecycle &lt;A href="https://www.talend.com/technical-support/support-statements/" alt="https://www.talend.com/technical-support/support-statements/" target="_blank"&gt;https://www.talend.com/technical-support/support-statements/&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;For more information, please take a look at this response Publication Date: December 22, 202:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.talend.com/security/incident-response/" alt="https://www.talend.com/security/incident-response/" target="_blank"&gt;https://www.talend.com/security/incident-response/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 03:23:10 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j2-Vulnerability-Talend-6-5/m-p/2407138#M11404</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-12-23T03:23:10Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j2 Vulnerability [Talend 6.5]</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j2-Vulnerability-Talend-6-5/m-p/2407139#M11405</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The mitigation steps are now located on help.talend.com: &lt;A href="https://document-link.us.cloud.talend.com/talend_log4j2_cve_statement?lang=en&amp;amp;version=latest&amp;amp;env=prd" alt="https://document-link.us.cloud.talend.com/talend_log4j2_cve_statement?lang=en&amp;amp;version=latest&amp;amp;env=prd" target="_blank"&gt;https://document-link.us.cloud.talend.com/talend_log4j2_cve_statement?lang=en&amp;amp;version=latest&amp;amp;env=prd&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which provides all the workarounds for studio.&lt;/P&gt;&lt;P&gt;The mitigation steps that we have described in the &lt;A href="https://help.talend.com/r/EeTpT8r7xmeq1HtTGQBqGA/zX7iWLX6GgxOAjJPlpXNYA" alt="https://help.talend.com/r/EeTpT8r7xmeq1HtTGQBqGA/zX7iWLX6GgxOAjJPlpXNYA" target="_blank"&gt;Talend Help Center&lt;/A&gt; apply to TOS as well.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Fri, 31 Dec 2021 06:47:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Log4j2-Vulnerability-Talend-6-5/m-p/2407139#M11405</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-12-31T06:47:47Z</dc:date>
    </item>
  </channel>
</rss>

