With log4j there's a public blog page with two lists: #1 shows products not affected, and #2 shows products remediated (with links to more info).

If something is not in either list, that could mean it's still being evaluated, or (more likely?) in the category you mentioned - never published publicly. In that case the Security Portal is the only way to get further direct information. How to get vetted for that I have no idea. I've tried a couple of times with no luck - not even a reply. Maybe it's like the Masons, "...each candidate must be free and of good repute".

https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/

On 2/13/2022 7:30 AM, Ed Jaffe wrote:
On 2/13/2022 7:18 AM, Seymour J Metz wrote:
The (somewhat simplified) way that IBM handles this for z/OS is via hold data and customer notification of security fixes. IMHO that works well.

Disclosed to customers only via a secure channel that limits exposure to a select list of vetted employees with a need to know.

Never published publicly in any way, shape or form.



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to