Re: Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on SP client with security vulnerability: CVE-2021-44228

2022-01-06 Thread Zoltan Forray
Thank you for the update. I saw that and have downloaded the updated client.

On Wed, Jan 5, 2022 at 4:21 PM Uwe Schreiber 
wrote:

> Hi Zoltan,
>
> B/A Client Version 8.1.13.2 is available,
> which includes Log4j 2.17.0
>
>
> https://www.ibm.com/support/pages/security-bulletin-vulnerabilities-apache-log4j-impacts-ibm-spectrum-protect-backup-archive-client-and-ibm-spectrum-protect-virtual-environments-cve-2021-45105-cve-2021-45046
>
> Regards, Uwe
>
> > Am 17.12.2021 um 17:54 schrieb Zoltan Forray :
> >
> > Unfortunately, the 8.1.13.1 update of the Backup-Archive client only
> > addresses CVE-2021-44228 (https://www.ibm.com/support/pages/node/6527080
> )
> > and not CVE-2021-45046.  So I guess there is an 8.1.13.2 on the horizon?
> >
> >> On Thu, Dec 16, 2021 at 2:52 AM Uwe Schreiber <
> uwe.h.schrei...@t-online.de>
> >> wrote:
> >>
> >> Hello,
> >>
> >> IBM release Workarounds for several ISP components
> >>
> >> IBM Spectrum Protect Client web user interface
> >> Affected versions:
> >> 8.1.7.0-8.1.13.0 (Linux and Windows)
> >> 8.1.9.0-8.1.13.0 (AIX)
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
> >>
> >> ---
> >>
> >> IBM Spectrum Protetct for Virtual Environments: DP for VMware
> >> Affected versions:
> >> 8.1.0.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
> >> 7.1.0.0-7.1.8.12
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
> >>
> >> ---
> >>
> >> IBM Spectrum Protetct for Virtual Environments: DP for HyperV
> >> Affected versions:
> >> 8.1.4.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
> >>
> >> ---
> >>
> >> IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes
> >> IBM Spectrum Protect Plus Container Backup and Restore for OpenShift
> >> Affected versions:
> >> 10.1.9
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527090?myns=s033&mynp=OCSSNQFQ&mync=E&cm_sp=s033-_-OCSSNQFQ-_-E
> >>
> >> -----------
> >>
> >> IBM Spectrum Protect Operations Center
> >> Affected versions:
> >> 8.1.0.000-8.1.13.000
> >> 7.1.0.000-7.1.14.000
> >>
> >>
> >>
> https://www.ibm.com/support/pages/node/6527084?myns=s033&mynp=OCSSER5J&mync=E&cm_sp=s033-_-OCSSER5J-_-E
> >>
> >>
> >> Regards, Uwe
> >>
> >> -Original Message-
> >> From: ADSM: Dist Stor Manager  On Behalf Of
> Rainer
> >> Tammer
> >> Sent: Donnerstag, 16. Dezember 2021 08:22
> >> To: ADSM-L@VM.MARIST.EDU
> >> Subject: Re: [ADSM-L] Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any
> >> impact on SP client with security vulnerability: CVE-2021-44228
> >>
> >> Hello,
> >> Currently this is the safest way to fix that problem (in my opinion):
> >>
> >>   zip -q -d log4j-core-2.nn.n.jar
> >> org/apache/logging/log4j/core/lookup/JndiLookup.class
> >>
> >> The Log4J v1.x does also have a problem:
> >>
> >> CVE-2019-17571 and CVE-2017-5645
> >> The CVE-2019-17571 issue is also fixed by the fix for CVE-2017-5645.
> >>
> >> RHEL/CentOS has a fixed 1.2.17:
> >>
> >> log4j-1.2.17-16.el7_4.src.rpm
> >> log4j-1.2.17-16.el7_4.noarch.rpm
> >>
> >>
> >> Bye
> >>   Rainer
> >>
> >>> On 15.12.2021 15:01, Zoltan Forray wrote:
> >>> It's a moving target.  They just announced a second vulnerability and
> >>> have released 2.16.  I would not be surprised they find more!
> >>>
> >>> https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-
> >>> log4j-2-16-0-released/
> >>>
> >>> On Wed, Dec 15, 2021 at 5:28 AM Alexander Heindl <
> >>> alexander.hei...@generali.com> wrote:
> >>>
> >>>> that's correct.
> >>>>
> >>>> for me it's just a workaround until IBM provides a fix for it.
> >>>

Re: Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on SP client with security vulnerability: CVE-2021-44228

2022-01-05 Thread Uwe Schreiber
Hi Zoltan,

B/A Client Version 8.1.13.2 is available,
which includes Log4j 2.17.0

https://www.ibm.com/support/pages/security-bulletin-vulnerabilities-apache-log4j-impacts-ibm-spectrum-protect-backup-archive-client-and-ibm-spectrum-protect-virtual-environments-cve-2021-45105-cve-2021-45046

Regards, Uwe

> Am 17.12.2021 um 17:54 schrieb Zoltan Forray :
> 
> Unfortunately, the 8.1.13.1 update of the Backup-Archive client only
> addresses CVE-2021-44228 (https://www.ibm.com/support/pages/node/6527080)
> and not CVE-2021-45046.  So I guess there is an 8.1.13.2 on the horizon?
> 
>> On Thu, Dec 16, 2021 at 2:52 AM Uwe Schreiber 
>> wrote:
>> 
>> Hello,
>> 
>> IBM release Workarounds for several ISP components
>> 
>> IBM Spectrum Protect Client web user interface
>> Affected versions:
>> 8.1.7.0-8.1.13.0 (Linux and Windows)
>> 8.1.9.0-8.1.13.0 (AIX)
>> 
>> 
>> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
>> 
>> ---
>> 
>> IBM Spectrum Protetct for Virtual Environments: DP for VMware
>> Affected versions:
>> 8.1.0.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
>> 7.1.0.0-7.1.8.12
>> 
>> 
>> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
>> 
>> ---
>> 
>> IBM Spectrum Protetct for Virtual Environments: DP for HyperV
>> Affected versions:
>> 8.1.4.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
>> 
>> 
>> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
>> 
>> ---
>> 
>> IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes
>> IBM Spectrum Protect Plus Container Backup and Restore for OpenShift
>> Affected versions:
>> 10.1.9
>> 
>> 
>> https://www.ibm.com/support/pages/node/6527090?myns=s033&mynp=OCSSNQFQ&mync=E&cm_sp=s033-_-OCSSNQFQ-_-E
>> 
>> ---
>> 
>> IBM Spectrum Protect Operations Center
>> Affected versions:
>> 8.1.0.000-8.1.13.000
>> 7.1.0.000-7.1.14.000
>> 
>> 
>> https://www.ibm.com/support/pages/node/6527084?myns=s033&mynp=OCSSER5J&mync=E&cm_sp=s033-_-OCSSER5J-_-E
>> 
>> 
>> Regards, Uwe
>> 
>> -Original Message-
>> From: ADSM: Dist Stor Manager  On Behalf Of Rainer
>> Tammer
>> Sent: Donnerstag, 16. Dezember 2021 08:22
>> To: ADSM-L@VM.MARIST.EDU
>> Subject: Re: [ADSM-L] Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any
>> impact on SP client with security vulnerability: CVE-2021-44228
>> 
>> Hello,
>> Currently this is the safest way to fix that problem (in my opinion):
>> 
>>   zip -q -d log4j-core-2.nn.n.jar
>> org/apache/logging/log4j/core/lookup/JndiLookup.class
>> 
>> The Log4J v1.x does also have a problem:
>> 
>> CVE-2019-17571 and CVE-2017-5645
>> The CVE-2019-17571 issue is also fixed by the fix for CVE-2017-5645.
>> 
>> RHEL/CentOS has a fixed 1.2.17:
>> 
>> log4j-1.2.17-16.el7_4.src.rpm
>> log4j-1.2.17-16.el7_4.noarch.rpm
>> 
>> 
>> Bye
>>   Rainer
>> 
>>> On 15.12.2021 15:01, Zoltan Forray wrote:
>>> It's a moving target.  They just announced a second vulnerability and
>>> have released 2.16.  I would not be surprised they find more!
>>> 
>>> https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-
>>> log4j-2-16-0-released/
>>> 
>>> On Wed, Dec 15, 2021 at 5:28 AM Alexander Heindl <
>>> alexander.hei...@generali.com> wrote:
>>> 
>>>> that's correct.
>>>> 
>>>> for me it's just a workaround until IBM provides a fix for it.
>>>> 
>>>> 8.1.12 and 8.1.13: both use 2.13.3.
>>>> 
>>>> Regards,
>>>> Alex Heindl
>>>> 
>>>> 
>>>> 
>>>> 
>>>> Von:"Rainer Tammer"
>>>> An:ADSM-L@VM.MARIST.EDU
>>>> Datum:  15.12.2021 11:20
>>>> Betreff:[EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact
>>>> on SP client with security vulnerability: CVE-2021-44228
>>>> Gesendet von:   "ADSM: Dist Stor Manager"
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> Hello,
>

Re: Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on SP client with security vulnerability: CVE-2021-44228

2021-12-17 Thread Zoltan Forray
Unfortunately, the 8.1.13.1 update of the Backup-Archive client only
addresses CVE-2021-44228 (https://www.ibm.com/support/pages/node/6527080)
and not CVE-2021-45046.  So I guess there is an 8.1.13.2 on the horizon?

On Thu, Dec 16, 2021 at 2:52 AM Uwe Schreiber 
wrote:

> Hello,
>
> IBM release Workarounds for several ISP components
>
> IBM Spectrum Protect Client web user interface
> Affected versions:
> 8.1.7.0-8.1.13.0 (Linux and Windows)
> 8.1.9.0-8.1.13.0 (AIX)
>
>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
>
> ---
>
> IBM Spectrum Protetct for Virtual Environments: DP for VMware
> Affected versions:
> 8.1.0.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
> 7.1.0.0-7.1.8.12
>
>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
>
> ---
>
> IBM Spectrum Protetct for Virtual Environments: DP for HyperV
> Affected versions:
> 8.1.4.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
>
>
> https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E
>
> ---
>
> IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes
> IBM Spectrum Protect Plus Container Backup and Restore for OpenShift
> Affected versions:
> 10.1.9
>
>
> https://www.ibm.com/support/pages/node/6527090?myns=s033&mynp=OCSSNQFQ&mync=E&cm_sp=s033-_-OCSSNQFQ-_-E
>
> ---
>
> IBM Spectrum Protect Operations Center
> Affected versions:
> 8.1.0.000-8.1.13.000
> 7.1.0.000-7.1.14.000
>
>
> https://www.ibm.com/support/pages/node/6527084?myns=s033&mynp=OCSSER5J&mync=E&cm_sp=s033-_-OCSSER5J-_-E
>
>
> Regards, Uwe
>
> -----Original Message-
> From: ADSM: Dist Stor Manager  On Behalf Of Rainer
> Tammer
> Sent: Donnerstag, 16. Dezember 2021 08:22
> To: ADSM-L@VM.MARIST.EDU
> Subject: Re: [ADSM-L] Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any
> impact on SP client with security vulnerability: CVE-2021-44228
>
> Hello,
> Currently this is the safest way to fix that problem (in my opinion):
>
>zip -q -d log4j-core-2.nn.n.jar
> org/apache/logging/log4j/core/lookup/JndiLookup.class
>
> The Log4J v1.x does also have a problem:
>
> CVE-2019-17571 and CVE-2017-5645
> The CVE-2019-17571 issue is also fixed by the fix for CVE-2017-5645.
>
> RHEL/CentOS has a fixed 1.2.17:
>
> log4j-1.2.17-16.el7_4.src.rpm
> log4j-1.2.17-16.el7_4.noarch.rpm
>
>
> Bye
>Rainer
>
> On 15.12.2021 15:01, Zoltan Forray wrote:
> > It's a moving target.  They just announced a second vulnerability and
> > have released 2.16.  I would not be surprised they find more!
> >
> > https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-
> > log4j-2-16-0-released/
> >
> > On Wed, Dec 15, 2021 at 5:28 AM Alexander Heindl <
> > alexander.hei...@generali.com> wrote:
> >
> >> that's correct.
> >>
> >> for me it's just a workaround until IBM provides a fix for it.
> >>
> >> 8.1.12 and 8.1.13: both use 2.13.3.
> >>
> >> Regards,
> >> Alex Heindl
> >>
> >>
> >>
> >>
> >> Von:"Rainer Tammer"
> >> An:ADSM-L@VM.MARIST.EDU
> >> Datum:  15.12.2021 11:20
> >> Betreff:[EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact
> >> on SP client with security vulnerability: CVE-2021-44228
> >> Gesendet von:   "ADSM: Dist Stor Manager"
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >> Hello,
> >> You have to be careful with that. The switch does only work if Log4J
> >> is
> >> 2.10 or higher.
> >>
> >> Bye
> >> Rainer
> >>
> >> On 15.12.2021 10:29, Alexander Heindl wrote:
> >>> What I did on Windows with ISP Client 8.1.12, Webrestore installed
> >>> and
> >>> running:
> >>>
> >>> add the last line (-Dlog4j2.formatMsgNoLookups=true) in
> >>> C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\jvm.options,
> >>> so that it looks like this:
> >>> --8<--
> >>> #Thu Oct 30 15:00:51 PDT 2014
> >>> -Dcom.ibm.jsse2.sp800-131=transition
> >>> -Dlog4j2.formatMsgNoLookups=true
> >>> --8<--

Re: Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on SP client with security vulnerability: CVE-2021-44228

2021-12-15 Thread Uwe Schreiber
Hello,

IBM release Workarounds for several ISP components

IBM Spectrum Protect Client web user interface
Affected versions:
8.1.7.0-8.1.13.0 (Linux and Windows)
8.1.9.0-8.1.13.0 (AIX)  

https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E

---

IBM Spectrum Protetct for Virtual Environments: DP for VMware
Affected versions:
8.1.0.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)
7.1.0.0-7.1.8.12

https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E

---

IBM Spectrum Protetct for Virtual Environments: DP for HyperV
Affected versions:
8.1.4.0-8.1.13.0 (and DataMover beginnen version 8.1.9 and above)

https://www.ibm.com/support/pages/node/6527080?myns=swgtiv&mynp=OCSSEQVQ&mync=E&cm_sp=swgtiv-_-OCSSEQVQ-_-E

---

IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes
IBM Spectrum Protect Plus Container Backup and Restore for OpenShift
Affected versions:
10.1.9

https://www.ibm.com/support/pages/node/6527090?myns=s033&mynp=OCSSNQFQ&mync=E&cm_sp=s033-_-OCSSNQFQ-_-E

---

IBM Spectrum Protect Operations Center
Affected versions:
8.1.0.000-8.1.13.000
7.1.0.000-7.1.14.000

https://www.ibm.com/support/pages/node/6527084?myns=s033&mynp=OCSSER5J&mync=E&cm_sp=s033-_-OCSSER5J-_-E


Regards, Uwe

-Original Message-
From: ADSM: Dist Stor Manager  On Behalf Of Rainer Tammer
Sent: Donnerstag, 16. Dezember 2021 08:22
To: ADSM-L@VM.MARIST.EDU
Subject: Re: [ADSM-L] Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on 
SP client with security vulnerability: CVE-2021-44228

Hello,
Currently this is the safest way to fix that problem (in my opinion):

   zip -q -d log4j-core-2.nn.n.jar
org/apache/logging/log4j/core/lookup/JndiLookup.class

The Log4J v1.x does also have a problem:

CVE-2019-17571 and CVE-2017-5645
The CVE-2019-17571 issue is also fixed by the fix for CVE-2017-5645.

RHEL/CentOS has a fixed 1.2.17:

log4j-1.2.17-16.el7_4.src.rpm
log4j-1.2.17-16.el7_4.noarch.rpm


Bye
   Rainer

On 15.12.2021 15:01, Zoltan Forray wrote:
> It's a moving target.  They just announced a second vulnerability and 
> have released 2.16.  I would not be surprised they find more!
>
> https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-
> log4j-2-16-0-released/
>
> On Wed, Dec 15, 2021 at 5:28 AM Alexander Heindl < 
> alexander.hei...@generali.com> wrote:
>
>> that's correct.
>>
>> for me it's just a workaround until IBM provides a fix for it.
>>
>> 8.1.12 and 8.1.13: both use 2.13.3.
>>
>> Regards,
>> Alex Heindl
>>
>>
>>
>>
>> Von:"Rainer Tammer"
>> An:ADSM-L@VM.MARIST.EDU
>> Datum:  15.12.2021 11:20
>> Betreff:[EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact
>> on SP client with security vulnerability: CVE-2021-44228
>> Gesendet von:   "ADSM: Dist Stor Manager"
>>
>>
>>
>>
>>
>>
>>
>>
>> Hello,
>> You have to be careful with that. The switch does only work if Log4J 
>> is
>> 2.10 or higher.
>>
>> Bye
>> Rainer
>>
>> On 15.12.2021 10:29, Alexander Heindl wrote:
>>> What I did on Windows with ISP Client 8.1.12, Webrestore installed 
>>> and
>>> running:
>>>
>>> add the last line (-Dlog4j2.formatMsgNoLookups=true) in 
>>> C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\jvm.options, 
>>> so that it looks like this:
>>> --8<--
>>> #Thu Oct 30 15:00:51 PDT 2014
>>> -Dcom.ibm.jsse2.sp800-131=transition
>>> -Dlog4j2.formatMsgNoLookups=true
>>> --8<--
>>>
>>> then restart "IBMWebserver"
>>>
>>> Regards,
>>> Alex Heindl
>>>
>>>
>>>
>>>
>>> Von:"Rainer Tammer"
>>> An:ADSM-L@VM.MARIST.EDU
>>> Datum:  15.12.2021 08:31
>>> Betreff:[EXTERNAL] Re: [ADSM-L] Any impact on SP client with
>>> security vulnerability: CVE-2021-44228
>>> Gesendet von:   "ADSM: Dist Stor Manager"
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> Hello,
>>> We are also waiting for the fixes. The problem is quite obvious.
>>> The risk is high, and there are currently no official fixes/mitigations.
>>>
>>> Changing Java parameters/setting environment variables for log4j >= 
>>> 2.10 mig

Re: Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on SP client with security vulnerability: CVE-2021-44228

2021-12-15 Thread Rainer Tammer

Hello,
Currently this is the safest way to fix that problem (in my opinion):

  zip -q -d log4j-core-2.nn.n.jar 
org/apache/logging/log4j/core/lookup/JndiLookup.class


The Log4J v1.x does also have a problem:

CVE-2019-17571 and CVE-2017-5645
The CVE-2019-17571 issue is also fixed by the fix for CVE-2017-5645.

RHEL/CentOS has a fixed 1.2.17:

log4j-1.2.17-16.el7_4.src.rpm
log4j-1.2.17-16.el7_4.noarch.rpm


Bye
  Rainer

On 15.12.2021 15:01, Zoltan Forray wrote:

It's a moving target.  They just announced a second vulnerability and have
released 2.16.  I would not be surprised they find more!

https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-log4j-2-16-0-released/

On Wed, Dec 15, 2021 at 5:28 AM Alexander Heindl <
alexander.hei...@generali.com> wrote:


that's correct.

for me it's just a workaround until IBM provides a fix for it.

8.1.12 and 8.1.13: both use 2.13.3.

Regards,
Alex Heindl




Von:"Rainer Tammer"
An:ADSM-L@VM.MARIST.EDU
Datum:  15.12.2021 11:20
Betreff:[EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact
on SP client with security vulnerability: CVE-2021-44228
Gesendet von:   "ADSM: Dist Stor Manager"








Hello,
You have to be careful with that. The switch does only work if Log4J is
2.10 or higher.

Bye
Rainer

On 15.12.2021 10:29, Alexander Heindl wrote:

What I did on Windows with ISP Client 8.1.12, Webrestore installed and
running:

add the last line (-Dlog4j2.formatMsgNoLookups=true) in
C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\jvm.options, so
that it looks like this:
--8<--
#Thu Oct 30 15:00:51 PDT 2014
-Dcom.ibm.jsse2.sp800-131=transition
-Dlog4j2.formatMsgNoLookups=true
--8<--

then restart "IBMWebserver"

Regards,
Alex Heindl




Von:"Rainer Tammer"
An:ADSM-L@VM.MARIST.EDU
Datum:  15.12.2021 08:31
Betreff:[EXTERNAL] Re: [ADSM-L] Any impact on SP client with
security vulnerability: CVE-2021-44228
Gesendet von:   "ADSM: Dist Stor Manager"








Hello,
We are also waiting for the fixes. The problem is quite obvious.
The risk is high, and there are currently no official fixes/mitigations.

Changing Java parameters/setting environment variables for log4j >= 2.10
might be tricky.
It could be hard to find all necessary places

We will try the following fix on OC and on the client.

Sample "fix" for log4j-core-2.13.3.gar included in the client:

 zip -q -d log4j-core-2.13.3.jar
org/apache/logging/log4j/core/lookup/JndiLookup.class

NOTE: The application using this library must be restarted completely
after the change.
NOTE: This may pose problems in a FIPS environment.
NOTE: The problematic Java archive may be inside buried in a .war file,
in this case the .war must be refreshed with a changed

log4j-core-nnn.jar.

*Anny comments?*

Bye
 Rainer

On 13.12.2021 12:25, Del Hoobler wrote:

Please watch this page:



https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/


IBM is actively working on a this.

Del




"ADSM: Dist Stor Manager"wrote on 12/12/2021
01:31:46 AM:


From: "Bommasani, Venu"
To:ADSM-L@VM.MARIST.EDU
Date: 12/12/2021 01:32 AM
Subject: [EXTERNAL] Any impact on SP client with security
vulnerability: CVE-2021-44228
Sent by: "ADSM: Dist Stor Manager"

Hello All,

Our security Team reported below file as vulnerability with
reference of CVE-2021-44228 on Linux servers.

/opt/tivoli/tsm/client/ba/bin/plugins/vcloudsuite/sdk/log4j-1.2.17.jar

We haven't received any information from IBM yet under a Sev1
ticket, But as per Support Team this recent vulnerability
CVE-2021-44228 is still being investigated.

Does any one has any idea ? remediation ?

Since vulnerability CVE-2021-44228  treated as Critical, We are
proceeding with removing file directly from all Linux servers.

Best Regards,
_
Venu Bommasani
Storage & Data Protection
Mobile: +91 7795213309 /venu.bommas...@capgemini.com<

mailto:venu.bommas...@capgemini.com>

This message contains information that may be privileged or
confidential and is the property of the Capgemini Group. It is
intended only for the person to whom it is addressed. If you are not
the intended recipient, you are not authorized to read, print,
retain, copy, disseminate, distribute, or use this message or any
part thereof. If you receive this message in error, please notify
the sender immediately and delete all copies of this message.


--
*Zoltan Forray*
Backup Systems Administrator
VMware Administrator
Virginia Commonwealth University
UCC/Office of Technology Services
www.ucc.vcu.edu
zfor...@vcu.edu  - 804-828-4807
Don't be a phishing victim - VCU and other reputable organizations will
never use email to request that you reply with your password, social
security number or confidential personal information. For more details
visithttp://phishing.vcu.edu/


Re: Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on SP client with security vulnerability: CVE-2021-44228

2021-12-15 Thread Zoltan Forray
It's a moving target.  They just announced a second vulnerability and have
released 2.16.  I would not be surprised they find more!

https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-log4j-2-16-0-released/

On Wed, Dec 15, 2021 at 5:28 AM Alexander Heindl <
alexander.hei...@generali.com> wrote:

> that's correct.
>
> for me it's just a workaround until IBM provides a fix for it.
>
> 8.1.12 and 8.1.13: both use 2.13.3.
>
> Regards,
> Alex Heindl
>
>
>
>
> Von:"Rainer Tammer" 
> An: ADSM-L@VM.MARIST.EDU
> Datum:  15.12.2021 11:20
> Betreff:[EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact
> on SP client with security vulnerability: CVE-2021-44228
> Gesendet von:   "ADSM: Dist Stor Manager" 
>
>
>
>
>
>
>
>
> Hello,
> You have to be careful with that. The switch does only work if Log4J is
> 2.10 or higher.
>
> Bye
>Rainer
>
> On 15.12.2021 10:29, Alexander Heindl wrote:
> > What I did on Windows with ISP Client 8.1.12, Webrestore installed and
> > running:
> >
> > add the last line (-Dlog4j2.formatMsgNoLookups=true) in
> > C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\jvm.options, so
> > that it looks like this:
> > --8<--
> > #Thu Oct 30 15:00:51 PDT 2014
> > -Dcom.ibm.jsse2.sp800-131=transition
> > -Dlog4j2.formatMsgNoLookups=true
> > --8<--
> >
> > then restart "IBMWebserver"
> >
> > Regards,
> > Alex Heindl
> >
> >
> >
> >
> > Von:"Rainer Tammer"
> > An:ADSM-L@VM.MARIST.EDU
> > Datum:  15.12.2021 08:31
> > Betreff:[EXTERNAL] Re: [ADSM-L] Any impact on SP client with
> > security vulnerability: CVE-2021-44228
> > Gesendet von:   "ADSM: Dist Stor Manager"
> >
> >
> >
> >
> >
> >
> >
> >
> > Hello,
> > We are also waiting for the fixes. The problem is quite obvious.
> > The risk is high, and there are currently no official fixes/mitigations.
> >
> > Changing Java parameters/setting environment variables for log4j >= 2.10
> > might be tricky.
> > It could be hard to find all necessary places
> >
> > We will try the following fix on OC and on the client.
> >
> > Sample "fix" for log4j-core-2.13.3.gar included in the client:
> >
> > zip -q -d log4j-core-2.13.3.jar
> > org/apache/logging/log4j/core/lookup/JndiLookup.class
> >
> > NOTE: The application using this library must be restarted completely
> > after the change.
> > NOTE: This may pose problems in a FIPS environment.
> > NOTE: The problematic Java archive may be inside buried in a .war file,
> > in this case the .war must be refreshed with a changed
> log4j-core-nnn.jar.
> >
> > *Anny comments?*
> >
> > Bye
> > Rainer
> >
> > On 13.12.2021 12:25, Del Hoobler wrote:
> >> Please watch this page:
> >>
> >>
> >
>
> https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/
>
> >
> >> IBM is actively working on a this.
> >>
> >> Del
> >>
> >> 
> >>
> >>
> >> "ADSM: Dist Stor Manager"   wrote on 12/12/2021
> >> 01:31:46 AM:
> >>
> >>> From: "Bommasani, Venu"
> >>> To:ADSM-L@VM.MARIST.EDU
> >>> Date: 12/12/2021 01:32 AM
> >>> Subject: [EXTERNAL] Any impact on SP client with security
> >>> vulnerability: CVE-2021-44228
> >>> Sent by: "ADSM: Dist Stor Manager"
> >>>
> >>> Hello All,
> >>>
> >>> Our security Team reported below file as vulnerability with
> >>> reference of CVE-2021-44228 on Linux servers.
> >>>
> >>> /opt/tivoli/tsm/client/ba/bin/plugins/vcloudsuite/sdk/log4j-1.2.17.jar
> >>>
> >>> We haven't received any information from IBM yet under a Sev1
> >>> ticket, But as per Support Team this recent vulnerability
> >>> CVE-2021-44228 is still being investigated.
> >>>
> >>> Does any one has any idea ? remediation ?
> >>>
> >>> Since vulnerability CVE-2021-44228  treated as Critical, We are
> >>> proceeding with removing file directly from all Linux servers.
> >>>
> >>> Best Regards,
> >>> _
> >>> Venu Bommasani
> >>> Storage & Data Protection
> >>> Mobile: +91 7795213309 /venu.bommas...@capgemini.com<
> > mailto:venu.bommas...@capgemini.com>
> >>> This message contains information that may be privileged or
> >>> confidential and is the property of the Capgemini Group. It is
> >>> intended only for the person to whom it is addressed. If you are not
> >>> the intended recipient, you are not authorized to read, print,
> >>> retain, copy, disseminate, distribute, or use this message or any
> >>> part thereof. If you receive this message in error, please notify
> >>> the sender immediately and delete all copies of this message.
>


--
*Zoltan Forray*
Backup Systems Administrator
VMware Administrator
Virginia Commonwealth University
UCC/Office of Technology Services
www.ucc.vcu.edu
zfor...@vcu.edu - 804-828-4807
Don't be a phishing victim - VCU and other reputable organizations will
never use email to request that you reply with your password, social
security number or confiden

Antwort: Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact on SP client with security vulnerability: CVE-2021-44228

2021-12-15 Thread Alexander Heindl
that's correct.

for me it's just a workaround until IBM provides a fix for it.

8.1.12 and 8.1.13: both use 2.13.3.

Regards,
Alex Heindl




Von:"Rainer Tammer" 
An: ADSM-L@VM.MARIST.EDU
Datum:  15.12.2021 11:20
Betreff:[EXTERNAL] Re: [ADSM-L] Antwort: Re: [ADSM-L] Any impact
on SP client with security vulnerability: CVE-2021-44228
Gesendet von:   "ADSM: Dist Stor Manager" 








Hello,
You have to be careful with that. The switch does only work if Log4J is
2.10 or higher.

Bye
   Rainer

On 15.12.2021 10:29, Alexander Heindl wrote:
> What I did on Windows with ISP Client 8.1.12, Webrestore installed and
> running:
>
> add the last line (-Dlog4j2.formatMsgNoLookups=true) in
> C:\IBM\SpectrumProtect\webserver\usr\servers\veProfile\jvm.options, so
> that it looks like this:
> --8<--
> #Thu Oct 30 15:00:51 PDT 2014
> -Dcom.ibm.jsse2.sp800-131=transition
> -Dlog4j2.formatMsgNoLookups=true
> --8<--
>
> then restart "IBMWebserver"
>
> Regards,
> Alex Heindl
>
>
>
>
> Von:"Rainer Tammer"
> An:ADSM-L@VM.MARIST.EDU
> Datum:  15.12.2021 08:31
> Betreff:[EXTERNAL] Re: [ADSM-L] Any impact on SP client with
> security vulnerability: CVE-2021-44228
> Gesendet von:   "ADSM: Dist Stor Manager"
>
>
>
>
>
>
>
>
> Hello,
> We are also waiting for the fixes. The problem is quite obvious.
> The risk is high, and there are currently no official fixes/mitigations.
>
> Changing Java parameters/setting environment variables for log4j >= 2.10
> might be tricky.
> It could be hard to find all necessary places
>
> We will try the following fix on OC and on the client.
>
> Sample "fix" for log4j-core-2.13.3.gar included in the client:
>
> zip -q -d log4j-core-2.13.3.jar
> org/apache/logging/log4j/core/lookup/JndiLookup.class
>
> NOTE: The application using this library must be restarted completely
> after the change.
> NOTE: This may pose problems in a FIPS environment.
> NOTE: The problematic Java archive may be inside buried in a .war file,
> in this case the .war must be refreshed with a changed
log4j-core-nnn.jar.
>
> *Anny comments?*
>
> Bye
> Rainer
>
> On 13.12.2021 12:25, Del Hoobler wrote:
>> Please watch this page:
>>
>>
>
https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/

>
>> IBM is actively working on a this.
>>
>> Del
>>
>> 
>>
>>
>> "ADSM: Dist Stor Manager"   wrote on 12/12/2021
>> 01:31:46 AM:
>>
>>> From: "Bommasani, Venu"
>>> To:ADSM-L@VM.MARIST.EDU
>>> Date: 12/12/2021 01:32 AM
>>> Subject: [EXTERNAL] Any impact on SP client with security
>>> vulnerability: CVE-2021-44228
>>> Sent by: "ADSM: Dist Stor Manager"
>>>
>>> Hello All,
>>>
>>> Our security Team reported below file as vulnerability with
>>> reference of CVE-2021-44228 on Linux servers.
>>>
>>> /opt/tivoli/tsm/client/ba/bin/plugins/vcloudsuite/sdk/log4j-1.2.17.jar
>>>
>>> We haven't received any information from IBM yet under a Sev1
>>> ticket, But as per Support Team this recent vulnerability
>>> CVE-2021-44228 is still being investigated.
>>>
>>> Does any one has any idea ? remediation ?
>>>
>>> Since vulnerability CVE-2021-44228  treated as Critical, We are
>>> proceeding with removing file directly from all Linux servers.
>>>
>>> Best Regards,
>>> _
>>> Venu Bommasani
>>> Storage & Data Protection
>>> Mobile: +91 7795213309 /venu.bommas...@capgemini.com<
> mailto:venu.bommas...@capgemini.com>
>>> This message contains information that may be privileged or
>>> confidential and is the property of the Capgemini Group. It is
>>> intended only for the person to whom it is addressed. If you are not
>>> the intended recipient, you are not authorized to read, print,
>>> retain, copy, disseminate, distribute, or use this message or any
>>> part thereof. If you receive this message in error, please notify
>>> the sender immediately and delete all copies of this message.