Thank you for the update. I saw that and have downloaded the updated client.

On Wed, Jan 5, 2022 at 4:21 PM Uwe Schreiber <uwe.h.schrei...@t-online.de>
wrote:

> Hi Zoltan,
>
> B/A Client Version 8.1.13.2 is available,
> which includes Log4j 2.17.0
>
>
> https://www.ibm.com/support/pages/security-bulletin-vulnerabilities-apache-log4j-impacts-ibm-spectrum-protect-backup-archive-client-and-ibm-spectrum-protect-virtual-environments-cve-2021-45105-cve-2021-45046
>
> Regards, Uwe
>
> > Am 17.12.2021 um 17:54 schrieb Zoltan Forray <zfor...@vcu.edu>:
> >
> > Unfortunately, the 8.1.13.1 update of the Backup-Archive client only
> > addresses CVE-2021-44228 (https://www.ibm.com/support/pages/node/6527080
> )
> > and not CVE-2021-45046.  So I guess there is an 8.1.13.2 on the horizon?
> >
> >> On Thu, Dec 16, 2021 at 2:52 AM Uwe Schreiber <
> uwe.h.schrei...@t-online.de>
> >> wrote:
> >>
> >> Hello,
> >>
> >> IBM release Workarounds for several ISP components
> >>
> >> IBM Spectrum Protect Client web user interface
> >> Affected versions:
> >> 8.1.7.0-8.1.13.0 (Linux and Windows)
> >> 8.1.9.0-8.1.13.0 (AIX)
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
> >>
> >> -------------------
> >>
> >> IBM Spectrum Protetct for Virtual Environments: DP for VMware
> >> Affected versions:
> >> 8.1.0.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
> >> 7.1.0.0-7.1.8.12
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
> >>
> >> -------------------
> >>
> >> IBM Spectrum Protetct for Virtual Environments: DP for HyperV
> >> Affected versions:
> >> 8.1.4.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
> >>
> >> -------------------
> >>
> >> IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes
> >> IBM Spectrum Protect Plus Container Backup and Restore for OpenShift
> >> Affected versions:
> >> 10.1.9
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527090?myns=s033&mynp=OCSSNQFQ&mync=E&cm_sp=s033-_-OCSSNQFQ-_-E
> >>
> >> -------------------
> >>
> >> IBM Spectrum Protect Operations Center
> >> Affected versions:
> >> 8.1.0.000-8.1.13.000
> >> 7.1.0.000-7.1.14.000
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527084?myns=s033&mynp=OCSSER5J&mync=E&cm_sp=s033-_-OCSSER5J-_-E
> >>
> >>
> >> Regards, Uwe
> >>
> >> -----Original Message-----
> >> From: ADSM: Dist Stor Manager <ADSM-L@VM.MARIST.EDU> On Behalf Of
> Rainer
> >> Tammer
> >> Sent: Donnerstag, 16. Dezember 2021 08:22
> >> To: ADSM-L@VM.MARIST.EDU
> >> Subject: Re: [ADSM-L] Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any
> >> impact on SP client with security vulnerability: CVE-2021-44228
> >>
> >> Hello,
> >> Currently this is the safest way to fix that problem (in my opinion):
> >>
> >>   zip -q -d log4j-core-2.nn.n.jar
> >> org/apache/logging/log4j/core/lookup/JndiLookup.class
> >>
> >> The Log4J v1.x does also have a problem:
> >>
> >> CVE-2019-17571 and CVE-2017-5645
> >> The CVE-2019-17571 issue is also fixed by the fix for CVE-2017-5645.
> >>
> >> RHEL/CentOS has a fixed 1.2.17:
> >>
> >> log4j-1.2.17-16.el7_4.src.rpm
> >> log4j-1.2.17-16.el7_4.noarch.rpm
> >>
> >>
> >> Bye
> >>   Rainer
> >>
> >>> On 15.12.2021 15:01, Zoltan Forray wrote:
> >>> It's a moving target.  They just announced a second vulnerability and
> >>> have released 2.16.  I would not be surprised they find more!
> >>>
> >>> https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-
> >>> log4j-2-16-0-released/
> >>>
> >>> On Wed, Dec 15, 2021 at 5:28 AM Alexander Heindl <
> >>> alexander.hei...@generali.com> wrote:
> >>>
> >>>> that's correct.
> >>>>
> >>>> for me it's just a workaround until IBM provides a fix for it.
> >>>>
> >>>> 8.1.12 and 8.1.13: both use 2.13.3.
> >>>>
> >>>> Regards,
> >>>> Alex Heindl
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> Von:    "Rainer Tammer"<t...@spg.schulergroup.com>
> >>>> An:ADSM-L@VM.MARIST.EDU
> >>>> Datum:  15.12.2021 11:20
> >>>> Betreff:        [EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any
> impact
> >>>> on SP client with security vulnerability: CVE-2021-44228
> >>>> Gesendet von:   "ADSM: Dist Stor Manager"<ADSM-L@VM.MARIST.EDU>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> Hello,
> >>>> You have to be careful with that. The switch does only work if Log4J
> >>>> is
> >>>> 2.10 or higher.
> >>>>
> >>>> Bye
> >>>>    Rainer
> >>>>
> >>>> On 15.12.2021 10:29, Alexander Heindl wrote:
> >>>>> What I did on Windows with ISP Client 8.1.12, Webrestore installed
> >>>>> and
> >>>>> running:
> >>>>>
> >>>>> add the last line (-Dlog4j2.formatMsgNoLookups=true) in
> >>>>> C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\jvm.options,
> >>>>> so that it looks like this:
> >>>>> --------------8<------------------------------
> >>>>> #Thu Oct 30 15:00:51 PDT 2014
> >>>>> -Dcom.ibm.jsse2.sp800-131=transition
> >>>>> -Dlog4j2.formatMsgNoLookups=true
> >>>>> --------------8<------------------------------
> >>>>>
> >>>>> then restart "IBMWebserver"
> >>>>>
> >>>>> Regards,
> >>>>> Alex Heindl
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> Von:    "Rainer Tammer"<t...@spg.schulergroup.com>
> >>>>> An:ADSM-L@VM.MARIST.EDU
> >>>>> Datum:  15.12.2021 08:31
> >>>>> Betreff:        [EXTERNAL] Re: [ADSM-L] Any impact on SP client with
> >>>>> security vulnerability: CVE-2021-44228
> >>>>> Gesendet von:   "ADSM: Dist Stor Manager"<ADSM-L@VM.MARIST.EDU>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> Hello,
> >>>>> We are also waiting for the fixes. The problem is quite obvious.
> >>>>> The risk is high, and there are currently no official
> >> fixes/mitigations.
> >>>>>
> >>>>> Changing Java parameters/setting environment variables for log4j >=
> >>>>> 2.10 might be tricky.
> >>>>> It could be hard to find all necessary places....
> >>>>>
> >>>>> We will try the following fix on OC and on the client.
> >>>>>
> >>>>> Sample "fix" for log4j-core-2.13.3.gar included in the client:
> >>>>>
> >>>>>     zip -q -d log4j-core-2.13.3.jar
> >>>>> org/apache/logging/log4j/core/lookup/JndiLookup.class
> >>>>>
> >>>>> NOTE: The application using this library must be restarted
> >>>>> completely after the change.
> >>>>> NOTE: This may pose problems in a FIPS environment.
> >>>>> NOTE: The problematic Java archive may be inside buried in a .war
> >>>>> file, in this case the .war must be refreshed with a changed
> >>>> log4j-core-nnn.jar.
> >>>>> *Anny comments?*
> >>>>>
> >>>>> Bye
> >>>>>     Rainer
> >>>>>
> >>>>> On 13.12.2021 12:25, Del Hoobler wrote:
> >>>>>> Please watch this page:
> >>>>>>
> >>>>>>
> >>>> https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-202
> >>>> 1-44228-vulnerability/
> >>>>
> >>>>>> IBM is actively working on a this.
> >>>>>>
> >>>>>> Del
> >>>>>>
> >>>>>> ----------------------------------------------------
> >>>>>>
> >>>>>>
> >>>>>> "ADSM: Dist Stor Manager"<ADSM-L@VM.MARIST.EDU>    wrote on
> >> 12/12/2021
> >>>>>> 01:31:46 AM:
> >>>>>>
> >>>>>>> From: "Bommasani, Venu"<venu.bommas...@capgemini.com>
> >>>>>>> To:ADSM-L@VM.MARIST.EDU
> >>>>>>> Date: 12/12/2021 01:32 AM
> >>>>>>> Subject: [EXTERNAL] Any impact on SP client with security
> >>>>>>> vulnerability: CVE-2021-44228
> >>>>>>> Sent by: "ADSM: Dist Stor Manager"<ADSM-L@VM.MARIST.EDU>
> >>>>>>>
> >>>>>>> Hello All,
> >>>>>>>
> >>>>>>> Our security Team reported below file as vulnerability with
> >>>>>>> reference of CVE-2021-44228 on Linux servers.
> >>>>>>>
> >>>>>>> /opt/tivoli/tsm/client/ba/bin/plugins/vcloudsuite/sdk/log4j-1.2.17
> >>>>>>> .jar
> >>>>>>>
> >>>>>>> We haven't received any information from IBM yet under a Sev1
> >>>>>>> ticket, But as per Support Team this recent vulnerability
> >>>>>>> CVE-2021-44228 is still being investigated.
> >>>>>>>
> >>>>>>> Does any one has any idea ? remediation ?
> >>>>>>>
> >>>>>>> Since vulnerability CVE-2021-44228  treated as Critical, We are
> >>>>>>> proceeding with removing file directly from all Linux servers.
> >>>>>>>
> >>>>>>> Best Regards,
> >>>>>>> _____________________________________________
> >>>>>>> Venu Bommasani
> >>>>>>> Storage & Data Protection
> >>>>>>> Mobile: +91 7795213309 /venu.bommas...@capgemini.com<
> >>>>> mailto:venu.bommas...@capgemini.com>
> >>>>>>> This message contains information that may be privileged or
> >>>>>>> confidential and is the property of the Capgemini Group. It is
> >>>>>>> intended only for the person to whom it is addressed. If you are
> >>>>>>> not the intended recipient, you are not authorized to read, print,
> >>>>>>> retain, copy, disseminate, distribute, or use this message or any
> >>>>>>> part thereof. If you receive this message in error, please notify
> >>>>>>> the sender immediately and delete all copies of this message.
> >>>
> >>> --
> >>> *Zoltan Forray*
> >>> Backup Systems Administrator
> >>> VMware Administrator
> >>> Virginia Commonwealth University
> >>> UCC/Office of Technology Services
> >>> www.ucc.vcu.edu
> >>> zfor...@vcu.edu  - 804-828-4807
> >>> Don't be a phishing victim - VCU and other reputable organizations
> >>> will never use email to request that you reply with your password,
> >>> social security number or confidential personal information. For more
> >>> details visithttp://phishing.vcu.edu/
> >>> <https://adminmicro2.questionpro.com>
> >>>
> >>
> >
> >
> > --
> > *Zoltan Forray*
> > Backup Systems Administrator
> > VMware Administrator
> > Virginia Commonwealth University
> > UCC/Office of Technology Services
> > www.ucc.vcu.edu
> > zfor...@vcu.edu - 804-828-4807
> > Don't be a phishing victim - VCU and other reputable organizations will
> > never use email to request that you reply with your password, social
> > security number or confidential personal information. For more details
> > visit http://phishing.vcu.edu/
> > <https://adminmicro2.questionpro.com>
>


-- 
*Zoltan Forray*
Backup Systems Administrator
VMware Administrator
Virginia Commonwealth University
UCC/Office of Technology Services
www.ucc.vcu.edu
zfor...@vcu.edu - 804-828-4807
Don't be a phishing victim - VCU and other reputable organizations will
never use email to request that you reply with your password, social
security number or confidential personal information. For more details
visit http://phishing.vcu.edu/
<https://adminmicro2.questionpro.com>

Reply via email to