<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic log4j vulnerability issue in Installing and Upgrading</title>
    <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408715#M11989</link>
    <description>&lt;P&gt;Hi Team&lt;/P&gt;&lt;P&gt;We are using TOS 7.3.1 community edition&lt;/P&gt;&lt;P&gt;We are facing an issue with vulnerability with below jar files&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any patch on Talend so we can upgrade to remove these vulnerabilities&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need urgent help on fixing this vulnerability issue , with log4j 2.12.1 jar version&lt;/P&gt;&lt;P&gt;We need an upgraded log4j version &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0695b00000RgsUCAAZ.png"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/149094iED5C8D770F1DCBA7/image-size/large?v=v2&amp;amp;px=999" role="button" title="0695b00000RgsUCAAZ.png" alt="0695b00000RgsUCAAZ.png" /&gt;&lt;/span&gt;What is the latest production version of Talend &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Vamsi Krishna&lt;/P&gt;</description>
    <pubDate>Fri, 15 Nov 2024 22:56:03 GMT</pubDate>
    <dc:creator>krivamsi30</dc:creator>
    <dc:date>2024-11-15T22:56:03Z</dc:date>
    <item>
      <title>log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408715#M11989</link>
      <description>&lt;P&gt;Hi Team&lt;/P&gt;&lt;P&gt;We are using TOS 7.3.1 community edition&lt;/P&gt;&lt;P&gt;We are facing an issue with vulnerability with below jar files&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any patch on Talend so we can upgrade to remove these vulnerabilities&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need urgent help on fixing this vulnerability issue , with log4j 2.12.1 jar version&lt;/P&gt;&lt;P&gt;We need an upgraded log4j version &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0695b00000RgsUCAAZ.png"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/149094iED5C8D770F1DCBA7/image-size/large?v=v2&amp;amp;px=999" role="button" title="0695b00000RgsUCAAZ.png" alt="0695b00000RgsUCAAZ.png" /&gt;&lt;/span&gt;What is the latest production version of Talend &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Vamsi Krishna&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 22:56:03 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408715#M11989</guid>
      <dc:creator>krivamsi30</dc:creator>
      <dc:date>2024-11-15T22:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408716#M11990</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I’m afraid we do not supply patches for the Open Studio releases. We only provide patches for our subscription products.&lt;/P&gt;&lt;P&gt;The mitigation steps are now located on Talend Help Center&lt;/P&gt;&lt;P&gt;&lt;A href="https://help.talend.com/r/EeTpT8r7xmeq1HtTGQBqGA/zX7iWLX6GgxOAjJPlpXNYA" alt="https://help.talend.com/r/EeTpT8r7xmeq1HtTGQBqGA/zX7iWLX6GgxOAjJPlpXNYA" target="_blank"&gt;https://help.talend.com/r/EeTpT8r7xmeq1HtTGQBqGA/zX7iWLX6GgxOAjJPlpXNYA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Which provides all the workarounds for studio.&lt;/P&gt;&lt;P&gt;Note: The mitigation steps that we have described in the Talend Help apply to TOS as well.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Wed, 11 May 2022 07:01:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408716#M11990</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-05-11T07:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408717#M11991</link>
      <description>&lt;P&gt;What's the issue? Last week, a vulnerability was found in Log4j, an open-source logging library commonly used by apps and services across the internet. If left unfixed, attackers can break into systems, steal passwords and logins, extract data, and infect networks with malicious software. &lt;A href="https://www.myinsite.org/" alt="https://www.myinsite.org/" target="_blank"&gt;My Macys Insite Login&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 07:22:44 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408717#M11991</guid>
      <dc:creator>Todd66</dc:creator>
      <dc:date>2022-07-21T07:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408718#M11992</link>
      <description>&lt;P&gt;@Xiaodi Shi​&amp;nbsp; This should be considered for fixing in open studio too&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 19:05:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408718#M11992</guid>
      <dc:creator>krivamsi30</dc:creator>
      <dc:date>2022-07-21T19:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408719#M11993</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The latest version of Talend is v8 at the moment. This was released just prior to the Log4j bug, so the Open Studio version does not have the fixes built-in. The subscription v8 products have been patched. You can try upgrading the Log4j libraries that your version of Talend uses. Have you ever seen the “modules” section in the Studio? Here you can add and replace Jars which are used. You could try to replace the Jars affected with fixed Jars. If you try this, it would be best to test it thoroughly in a Studio that is a “throwaway” instance and not one you are currently using for development.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 02:49:48 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408719#M11993</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-07-22T02:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408720#M11994</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thanks for your suggestion. As Talend 8 version was released prior to the vulnerability being revealed, there would be built-in fixed in the next released for talend open solution.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 02:55:22 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408720#M11994</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-07-22T02:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408721#M11995</link>
      <description>&lt;P&gt;Hi Sabrina&lt;/P&gt;&lt;P&gt;I have tried this solution with 8.0.1 open source, it doesn't work &lt;/P&gt;&lt;P&gt;Every time Talend is opened, it creates these vulnerable jar files ​&lt;/P&gt;&lt;P&gt;​&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Vamsi Krishna​&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 13:09:03 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408721#M11995</guid>
      <dc:creator>krivamsi30</dc:creator>
      <dc:date>2022-07-23T13:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408722#M11996</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Could you please have a look at this topic about Updating a jar file for official Talend components&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.talend.com/s/question/0D55b00006K2hIBCAZ/updating-a-jar-file-for-official-talend-components" alt="https://community.talend.com/s/question/0D55b00006K2hIBCAZ/updating-a-jar-file-for-official-talend-components" target="_blank"&gt;https://community.talend.com/s/question/0D55b00006K2hIBCAZ/updating-a-jar-file-for-official-talend-components&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We made a testing on V 7.3.1 and it works. &lt;/P&gt;&lt;P&gt;Feel free to post your issue here.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 03:36:28 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408722#M11996</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-07-25T03:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408723#M11997</link>
      <description>&lt;P&gt;Hello xdshi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried updating jar file directly from modules but whenever I open Talend, those old vulnerable jars are created again in backend folders. How can we resolve this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TOS_DI-Win32-20200219_1130-V7.3.1\configuration\org.eclipse.osgi\460\0\.cp\lib\log4j-core-2.12.1.jar&lt;/P&gt;&lt;P&gt;TOS_DI-Win32-20200219_1130-V7.3.1\configuration\org.eclipse.osgi\698\0\.cp\lib\log4j-core-2.12.1.jar&lt;/P&gt;&lt;P&gt;TOS_DI-Win32-20200219_1130-V7.3.1\plugins\org.talend.core_7.3.1.20200217_1338.jar (lib/log4j-core-2.12.1.jar)&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 07:46:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408723#M11997</guid>
      <dc:creator>Eddy3</dc:creator>
      <dc:date>2022-11-16T07:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408724#M11998</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Could you please check if the newest vulnerable jars files are showing in the modules view as "installed"?&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 10:18:39 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408724#M11998</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2022-11-16T10:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408725#M11999</link>
      <description>&lt;P&gt;Hello xdshi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes all new jars are installed. Please check below screenshot&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0695b00000Z1tsKAAR.png"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/134558i7F687FF6636C5053/image-size/large?v=v2&amp;amp;px=999" role="button" title="0695b00000Z1tsKAAR.png" alt="0695b00000Z1tsKAAR.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I am still seeing some old log4j installed as well.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0695b00000Z1tu6AAB.png"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/129921iC14F7A44EE288DBF/image-size/large?v=v2&amp;amp;px=999" role="button" title="0695b00000Z1tu6AAB.png" alt="0695b00000Z1tu6AAB.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And I am also seeing vulnerable jars installed in below folders&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0695b00000Z1txeAAB.png"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/140590iB4FC8F93DE1D9433/image-size/large?v=v2&amp;amp;px=999" role="button" title="0695b00000Z1txeAAB.png" alt="0695b00000Z1txeAAB.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 18:21:16 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408725#M11999</guid>
      <dc:creator>Eddy3</dc:creator>
      <dc:date>2022-11-16T18:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: log4j vulnerability issue</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408726#M12000</link>
      <description>&lt;P&gt;First of all, keep calm. The affected issue cannot be used inside a Talend job because the Talend job does not allow (because of it design) to send user defined log messages from anywhere outside the job.&lt;/P&gt;&lt;P&gt;You are NOT in danger!&lt;/P&gt;&lt;P&gt;But unfortunately there are some guys in the companies scanning the projects and blaming you using the out-dated "dangerous" library. &lt;/P&gt;&lt;P&gt;The affected functionality can also simply switched of by a JVM parameter.&lt;/P&gt;&lt;P&gt;Take care you set this: LOG4J_FORMAT_MSG_NO_LOOKUPS=true. as environment variable (usually added to the job with -D)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 23:10:32 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/log4j-vulnerability-issue/m-p/2408726#M12000</guid>
      <dc:creator>jlolling</dc:creator>
      <dc:date>2022-12-06T23:10:32Z</dc:date>
    </item>
  </channel>
</rss>

