that's correct.

for me it's just a workaround until IBM provides a fix for it.

8.1.12 and 8.1.13: both use 2.13.3.

Regards,
Alex Heindl




Von:    "Rainer Tammer" <t...@spg.schulergroup.com>
An:     ADSM-L@VM.MARIST.EDU
Datum:  15.12.2021 11:20
Betreff:        [EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact
on SP client with security vulnerability: CVE-2021-44228
Gesendet von:   "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU>








Hello,
You have to be careful with that. The switch does only work if Log4J is
2.10 or higher.

Bye
   Rainer

On 15.12.2021 10:29, Alexander Heindl wrote:
> What I did on Windows with ISP Client 8.1.12, Webrestore installed and
> running:
>
> add the last line (-Dlog4j2.formatMsgNoLookups=true) in
> C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\jvm.options, so
> that it looks like this:
> --------------8<------------------------------
> #Thu Oct 30 15:00:51 PDT 2014
> -Dcom.ibm.jsse2.sp800-131=transition
> -Dlog4j2.formatMsgNoLookups=true
> --------------8<------------------------------
>
> then restart "IBMWebserver"
>
> Regards,
> Alex Heindl
>
>
>
>
> Von:    "Rainer Tammer"<t...@spg.schulergroup.com>
> An:ADSM-L@VM.MARIST.EDU
> Datum:  15.12.2021 08:31
> Betreff:        [EXTERNAL] Re: [ADSM-L] Any impact on SP client with
> security vulnerability: CVE-2021-44228
> Gesendet von:   "ADSM: Dist Stor Manager"<ADSM-L@VM.MARIST.EDU>
>
>
>
>
>
>
>
>
> Hello,
> We are also waiting for the fixes. The problem is quite obvious.
> The risk is high, and there are currently no official fixes/mitigations.
>
> Changing Java parameters/setting environment variables for log4j >= 2.10
> might be tricky.
> It could be hard to find all necessary places....
>
> We will try the following fix on OC and on the client.
>
> Sample "fix" for log4j-core-2.13.3.gar included in the client:
>
>     zip -q -d log4j-core-2.13.3.jar
> org/apache/logging/log4j/core/lookup/JndiLookup.class
>
> NOTE: The application using this library must be restarted completely
> after the change.
> NOTE: This may pose problems in a FIPS environment.
> NOTE: The problematic Java archive may be inside buried in a .war file,
> in this case the .war must be refreshed with a changed
log4j-core-nnn.jar.
>
> *Anny comments?*
>
> Bye
>     Rainer
>
> On 13.12.2021 12:25, Del Hoobler wrote:
>> Please watch this page:
>>
>>
>
https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/

>
>> IBM is actively working on a this.
>>
>> Del
>>
>> ----------------------------------------------------
>>
>>
>> "ADSM: Dist Stor Manager"<ADSM-L@VM.MARIST.EDU>   wrote on 12/12/2021
>> 01:31:46 AM:
>>
>>> From: "Bommasani, Venu"<venu.bommas...@capgemini.com>
>>> To:ADSM-L@VM.MARIST.EDU
>>> Date: 12/12/2021 01:32 AM
>>> Subject: [EXTERNAL] Any impact on SP client with security
>>> vulnerability: CVE-2021-44228
>>> Sent by: "ADSM: Dist Stor Manager"<ADSM-L@VM.MARIST.EDU>
>>>
>>> Hello All,
>>>
>>> Our security Team reported below file as vulnerability with
>>> reference of CVE-2021-44228 on Linux servers.
>>>
>>> /opt/tivoli/tsm/client/ba/bin/plugins/vcloudsuite/sdk/log4j-1.2.17.jar
>>>
>>> We haven't received any information from IBM yet under a Sev1
>>> ticket, But as per Support Team this recent vulnerability
>>> CVE-2021-44228 is still being investigated.
>>>
>>> Does any one has any idea ? remediation ?
>>>
>>> Since vulnerability CVE-2021-44228  treated as Critical, We are
>>> proceeding with removing file directly from all Linux servers.
>>>
>>> Best Regards,
>>> _____________________________________________
>>> Venu Bommasani
>>> Storage & Data Protection
>>> Mobile: +91 7795213309 /venu.bommas...@capgemini.com<
> mailto:venu.bommas...@capgemini.com>
>>> This message contains information that may be privileged or
>>> confidential and is the property of the Capgemini Group. It is
>>> intended only for the person to whom it is addressed. If you are not
>>> the intended recipient, you are not authorized to read, print,
>>> retain, copy, disseminate, distribute, or use this message or any
>>> part thereof. If you receive this message in error, please notify
>>> the sender immediately and delete all copies of this message.

Reply via email to