<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Talend Open Studio: Release Scehdule in Installing and Upgrading</title>
    <link>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380277#M3583</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;So far, there is no documentation for updating the Apache commons jar.&lt;/P&gt;&lt;P&gt;Please find the latest information on CVE-2022-42889&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.talend.com/security/incident-response/#CVE-2022-42889" alt="https://www.talend.com/security/incident-response/#CVE-2022-42889" target="_blank"&gt;https://www.talend.com/security/incident-response/#CVE-2022-42889&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The Apache Security team have released a statement to clarify the impact of CVE-2022-42889: &lt;A href="https://blogs.apache.org/security/entry/cve-2022-42889" alt="https://blogs.apache.org/security/entry/cve-2022-42889" target="_blank"&gt;https://blogs.apache.org/security/entry/cve-2022-42889&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;"This issue is different from Log4Shell (CVE-2021-44228) because in Log4Shell, string interpolation was possible from the log message body, which commonly contains untrusted input. In the Apache Common Text issue, the relevant method is explicitly intended and clearly documented to perform string interpolation, so it is much less likely that applications would inadvertently pass in untrusted input without proper validation."&lt;/I&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jan 2023 03:13:58 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2023-01-11T03:13:58Z</dc:date>
    <item>
      <title>Talend Open Studio: Release Scehdule</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380274#M3580</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working with Talend Open Studio for Windows. I am trying to address &lt;/P&gt;&lt;P&gt;CVE-2022-42889.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering is there anyway to know when the next release of Open Studio will be released where this vulnerability is address by having an upgraded jar?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried upgrading the Apache Commons Text jar myself, but my jobs will no longer build and product and error for a missing class path. Is there a way to resolve this if there are no recent open studio releases coming?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 22:13:58 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380274#M3580</guid>
      <dc:creator>Jlucas</dc:creator>
      <dc:date>2024-11-15T22:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Talend Open Studio: Release Scehdule</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380275#M3581</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Talend is aware of and monitoring CVE-2022-42889 (Apache Commons Text aka Text4Shell) security vulnerability.&lt;/P&gt;&lt;P&gt;Mitigations for the vulnerability were implemented in Talend Cloud on October 20, 2022 with no observed impact as a result of the vulnerability prior to implementing the mitigations.&lt;/P&gt;&lt;P&gt;Talend is scoping the remediation efforts throughout its Product portfolio and is in the process of developing the code fix to address the impacted Products.&lt;/P&gt;&lt;P&gt;Please see &lt;A href="https://www.talend.com/security/incident-response/" alt="https://www.talend.com/security/incident-response/" target="_blank"&gt;https://www.talend.com/security/incident-response/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I’m afraid we do not supply patches for the Open Studio releases. We only provide patches for our subscription products. &lt;/P&gt;&lt;P&gt;We will keep you posted as long as there is any information about the next release of Open Studio.&lt;/P&gt;&lt;P&gt;Really sorry for the inconvenience.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 08:01:06 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380275#M3581</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2023-01-09T08:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Talend Open Studio: Release Scehdule</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380276#M3582</link>
      <description>&lt;P&gt;Thanks for the response xdshi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ah I understand that is unfortunate. Do you have any documentation on how to properly update the apache commons jar in open studio?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 17:04:24 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380276#M3582</guid>
      <dc:creator>Jlucas</dc:creator>
      <dc:date>2023-01-10T17:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Talend Open Studio: Release Scehdule</title>
      <link>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380277#M3583</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;So far, there is no documentation for updating the Apache commons jar.&lt;/P&gt;&lt;P&gt;Please find the latest information on CVE-2022-42889&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.talend.com/security/incident-response/#CVE-2022-42889" alt="https://www.talend.com/security/incident-response/#CVE-2022-42889" target="_blank"&gt;https://www.talend.com/security/incident-response/#CVE-2022-42889&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The Apache Security team have released a statement to clarify the impact of CVE-2022-42889: &lt;A href="https://blogs.apache.org/security/entry/cve-2022-42889" alt="https://blogs.apache.org/security/entry/cve-2022-42889" target="_blank"&gt;https://blogs.apache.org/security/entry/cve-2022-42889&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;"This issue is different from Log4Shell (CVE-2021-44228) because in Log4Shell, string interpolation was possible from the log message body, which commonly contains untrusted input. In the Apache Common Text issue, the relevant method is explicitly intended and clearly documented to perform string interpolation, so it is much less likely that applications would inadvertently pass in untrusted input without proper validation."&lt;/I&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sabrina&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 03:13:58 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Installing-and-Upgrading/Talend-Open-Studio-Release-Scehdule/m-p/2380277#M3583</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2023-01-11T03:13:58Z</dc:date>
    </item>
  </channel>
</rss>

