<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynatrace version 1.228.136 - fixes for vulnerabilities in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/179456#M19733</link>
    <description>&lt;P&gt;That's not the Elasticsearch server but our&amp;nbsp; Dynatrace Server. Specifically this is Elasticsearch client library.&amp;nbsp;The Log4j library used in the Elasticsearch client library (esshadow-7.10.0-x.jar) was not affected by any of the Log4j CVEs and was also updated to 2.17.1 in Dynatrace Managed version 1.228.136.20220113-162730 and greater.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jan 2022 14:30:04 GMT</pubDate>
    <dc:creator>Radoslaw_Szulgo</dc:creator>
    <dc:date>2022-01-26T14:30:04Z</dc:date>
    <item>
      <title>Dynatrace version 1.228.136 - fixes for vulnerabilities</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/178816#M19641</link>
      <description>&lt;P&gt;HI ALL,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today we upgraded our dynatrace version to 1.228.136, does this version have any vulnerabilities, i hope fixes are done for his version? In the next few weeks we are going to update 1.230.148&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 08:26:11 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/178816#M19641</guid>
      <dc:creator>leelamoneykanta</dc:creator>
      <dc:date>2022-01-18T08:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Dynatrace version 1.228.136 - fixes for vulnerabilities</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/178817#M19642</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/47215"&gt;@leelamoneykanta&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this article you can check all the updates about the Log4j vulnerability, with status of impact and updates for Dynatrace products:&lt;BR /&gt;&lt;A href="https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/" target="_self"&gt;Log4j vulnerability (Log4Shell)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 08:30:41 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/178817#M19642</guid>
      <dc:creator>MaciejNeumann</dc:creator>
      <dc:date>2022-01-18T08:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: Dynatrace version 1.228.136 - fixes for vulnerabilities</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/178819#M19644</link>
      <description>&lt;P&gt;Yes, see updated release notes:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.dynatrace.com/support/help/shortlink/release-notes-managed-sprint-228#managed-sprint-228-136" target="_blank"&gt;https://www.dynatrace.com/support/help/shortlink/release-notes-managed-sprint-228#managed-sprint-228-136&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="managed-sprint-228-136"&gt;Update 136 (Build 1.228.136)&lt;/H3&gt;
&lt;P&gt;This cumulative update contains 4 resolved issue (including 3 vulnerability resolutions) and all previously released updates for the 1.228 release.&lt;/P&gt;
&lt;H4 id="managed-sprint-228-136-Cluster"&gt;Cluster&lt;/H4&gt;
&lt;UL class="list list--unordered"&gt;
&lt;LI&gt;&lt;STRONG&gt;Vulnerability:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;In response to CVE-2021-44228 and CVE-2021-45046, applied the recommended mitigation measures of removing `org/apache/logging/log4j/core/lookup/JndiLookup.class` from the Log4j library.&lt;SMALL&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(APM-342160)&lt;/SMALL&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Vulnerability:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;In response to CVE-2021-44832, CVE-2021-45105, CVE-2021-44228 and CVE-2021-45046, applied the recommended mitigation measures of updating the log4j library to the latest version 2.17.1. In Premium HA installations log4j update will take place in near future.&lt;SMALL&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(APM-345946)&lt;/SMALL&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Vulnerability:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;In response to CVE-2021-44228 (Log4j vulnerability), JVM parameters have been extended for Dynatrace Server and Elasticsearch.&lt;SMALL&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(APM-341605)&lt;/SMALL&gt;&lt;/LI&gt;
&lt;LI&gt;Improved baselining alert sensitivity for Settings 2.0 configurations to ensure appropriate alerting.&lt;SMALL&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(APM-341879)&lt;/SMALL&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 18 Jan 2022 09:21:30 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/178819#M19644</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2022-01-18T09:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: Dynatrace version 1.228.136 - fixes for vulnerabilities</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/179455#M19732</link>
      <description>&lt;P&gt;JndiLookup.class is still part of the updated&amp;nbsp;esshadow7-7.10.0-11.jar, after latest Managed update.&lt;BR /&gt;Is this still a concern? It triggers the deep scans of customer's hosting provider&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;/var/opt/dynatrace/managed/server/lib/esshadow7-7.10.0-11.jar | grep JndiLookup&lt;BR /&gt;3143 12-27-2021 17:30 org/apache/logging/log4j/core/lookup/JndiLookup.class&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Elasticsearch itself removed the class from their updated code:&lt;BR /&gt;&lt;A href="https://www.elastic.co/blog/new-elasticsearch-and-logstash-releases-upgrade-apache-log4j2" target="_blank"&gt;Introducing 7.16.2 and 6.8.22 releases of Elasticsearch and Logstash to upgrade Apache Log4j2 | Elastic Blog&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 14:09:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/179455#M19732</guid>
      <dc:creator>fstekelenburg</dc:creator>
      <dc:date>2022-01-26T14:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dynatrace version 1.228.136 - fixes for vulnerabilities</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/179456#M19733</link>
      <description>&lt;P&gt;That's not the Elasticsearch server but our&amp;nbsp; Dynatrace Server. Specifically this is Elasticsearch client library.&amp;nbsp;The Log4j library used in the Elasticsearch client library (esshadow-7.10.0-x.jar) was not affected by any of the Log4j CVEs and was also updated to 2.17.1 in Dynatrace Managed version 1.228.136.20220113-162730 and greater.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 14:30:04 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/179456#M19733</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2022-01-26T14:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dynatrace version 1.228.136 - fixes for vulnerabilities</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/179521#M19739</link>
      <description>&lt;P&gt;Thanks, adding the similar response I received from support with details:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;As for the esshadow jar did originally contain the JndiLookup.class file, but future releases will have this removed (Managed 1.234+ will have this removed). However, please note, esshadow does not call the vulnerable code at all. The log4j library bundled in esshadow&amp;nbsp; is only used in exactly one spot to log an internal class name. No user input is ever logged by this log4j instance. However, if this is still present this can also be removed with the below zip command, followed by a restart of the cluster.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;zip -q -d &amp;lt;jar-filename&amp;gt; org/apache/logging/log4j/core/lookup/JndiLookup.class &lt;/PRE&gt;</description>
      <pubDate>Thu, 27 Jan 2022 09:44:22 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Dynatrace-version-1-228-136-fixes-for-vulnerabilities/m-p/179521#M19739</guid>
      <dc:creator>fstekelenburg</dc:creator>
      <dc:date>2022-01-27T09:44:22Z</dc:date>
    </item>
  </channel>
</rss>

