Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Dennis Ritchie is twice as bright as Steve Jobs, and only half wrong. -- Jim Gettys


computers / comp.os.vms / VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

SubjectAuthor
* VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)Bob Gezelter
+* Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)Stephen Hoffman
|+* Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityhb
||`* Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)Stephen Hoffman
|| `* Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityCraig A. Berry
||  `* Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)Dennis Boone
||   `- Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityCraig A. Berry
|+* Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityCraig A. Berry
||`* Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityArne Vajhøj
|| `* Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityCraig A. Berry
||  `- Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityArne Vajhøj
|`- Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityArne Vajhøj
`- Re: VSI Comments on OpenVMS-related Log4j2 vulnerabilityArne Vajhøj

1
VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19387&group=comp.os.vms#19387

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:4ef:: with SMTP id b15mr9422696qkh.662.1639585024515;
Wed, 15 Dec 2021 08:17:04 -0800 (PST)
X-Received: by 2002:ae9:f401:: with SMTP id y1mr9048844qkl.127.1639585024372;
Wed, 15 Dec 2021 08:17:04 -0800 (PST)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 15 Dec 2021 08:17:04 -0800 (PST)
Injection-Info: google-groups.googlegroups.com; posting-host=100.2.113.217; posting-account=r2_qcwoAAACbIdit5Eka3ivGvrYZz7UQ
NNTP-Posting-Host: 100.2.113.217
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
Subject: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)
From: gezel...@rlgsc.com (Bob Gezelter)
Injection-Date: Wed, 15 Dec 2021 16:17:04 +0000
Content-Type: text/plain; charset="UTF-8"
Lines: 5
 by: Bob Gezelter - Wed, 15 Dec 2021 16:17 UTC

VMS Software has posted a bulletin about the recent Apache Log4j2 V2.14.1 (or earlier) vulnerability (CVE-2021-44228) as it affects #OpenVMS systems, including remediation for VSI-provided software components.

The full notice can be retrieved from: https://vmssoftware.com/about/news/2021-12-14-cve-2021-44228-comments/ #Log4j2

- Bob Gezelter, http://www.rlgsc.com

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<spd7k6$776$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19389&group=comp.os.vms#19389

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)
Date: Wed, 15 Dec 2021 12:11:34 -0500
Organization: HoffmanLabs LLC
Lines: 33
Message-ID: <spd7k6$776$1@dont-email.me>
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="e16fcbb1f08ecd2d4428834c26b10798";
logging-data="7398"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+z8BF7/5NWtiY5EHSMe504J0UU2VbWkpI="
User-Agent: Unison/2.2
Cancel-Lock: sha1:prEw58jJ2g47aLVB8QNwPAaoxBc=
 by: Stephen Hoffman - Wed, 15 Dec 2021 17:11 UTC

On 2021-12-15 16:17:04 +0000, Bob Gezelter said:

> VMS Software has posted a bulletin about the recent Apache Log4j2
> V2.14.1 (or earlier) vulnerability (CVE-2021-44228) as it affects
> #OpenVMS systems, including remediation for VSI-provided software
> components.
>
> The full notice can be retrieved from:
> https://vmssoftware.com/about/news/2021-12-14-cve-2021-44228-comments/

The zip command shown is twice wrong unfortunately, the mitigations
other than zip or patching to current are no longer being recommended
AFAICT, and the VSI bulletin is unfortunately missing mention of the
CVE-2021-45046 and CVE-2021-4104 vulnerabilities.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104

That the VSI bulletin doesn't mention the HPE 3PAR and XP
vulnerabilities is certainly understandable in some ways, but is also
less than helpful in others.

Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
affected and either need to be zip-mitigated, or needs to be updated as
that becomes available, based on that notice, too.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<spda0p$1e4k$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19393&group=comp.os.vms#19393

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!BA0xrQ4XT4JBAKatNn0A+g.user.46.165.242.91.POSTED!not-for-mail
From: end...@inter.net (hb)
Newsgroups: comp.os.vms
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Date: Wed, 15 Dec 2021 18:52:25 +0100
Organization: Aioe.org NNTP Server
Message-ID: <spda0p$1e4k$1@gioia.aioe.org>
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="47252"; posting-host="BA0xrQ4XT4JBAKatNn0A+g.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.14.0
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: hb - Wed, 15 Dec 2021 17:52 UTC

On 12/15/21 6:11 PM, Stephen Hoffman wrote:

> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
> affected and either need to be zip-mitigated, or needs to be updated as
> that becomes available, based on that notice, too.

As far as I know, VSI and HPE Tomcat, aka CSWS_JAVA, are based on Apache
Tomcat and the latter is not affected:
https://cwiki.apache.org/confluence/display/TOMCAT/Security#Security-Q13.

Whether applications deployed to Tomcat use log4j2 is a different question.

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<spdb86$3s1$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19394&group=comp.os.vms#19394

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: craigbe...@nospam.mac.com (Craig A. Berry)
Newsgroups: comp.os.vms
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Date: Wed, 15 Dec 2021 12:13:24 -0600
Organization: A noiseless patient Spider
Lines: 11
Message-ID: <spdb86$3s1$1@dont-email.me>
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 15 Dec 2021 18:13:26 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="c6535937b63bdce7b6b5af1c225c20f2";
logging-data="3969"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX188gXWIfGoREzbP8wEWc1UlHATODC4FILk="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.4.0
Cancel-Lock: sha1:LPCfkiyZl64YzkQZzxXeaUWWaK4=
In-Reply-To: <spd7k6$776$1@dont-email.me>
Content-Language: en-US
 by: Craig A. Berry - Wed, 15 Dec 2021 18:13 UTC

On 12/15/21 11:11 AM, Stephen Hoffman wrote:

> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
> affected and either need to be zip-mitigated, or needs to be updated as
> that becomes available, based on that notice, too.

Does the zip mitigation (deleting a class from a JAR) work on signed jar
files? I would have thought not since I would expect changing any
contents of a signed jar file would invalidate the signature. Which
means waiting for the signer, in many cases a third party, to fix their
code and re-sign it. Or seek other mitigations.

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<61ba32f3$0$697$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19396&group=comp.os.vms#19396

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 15 Dec 2021 13:24:50 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Content-Language: en-US
Newsgroups: comp.os.vms
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me> <spdb86$3s1$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spdb86$3s1$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 17
Message-ID: <61ba32f3$0$697$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: d07b3953.news.sunsite.dk
X-Trace: 1639592691 news.sunsite.dk 697 arne@vajhoej.dk/68.9.63.232:60893
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 18:24 UTC

On 12/15/2021 1:13 PM, Craig A. Berry wrote:
> On 12/15/21 11:11 AM, Stephen Hoffman wrote:
>> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
>> affected and either need to be zip-mitigated, or needs to be updated
>> as that becomes available, based on that notice, too.
>
> Does the zip mitigation (deleting a class from a JAR) work on signed jar
> files?  I would have thought not since I would expect changing any
> contents of a signed jar file would invalidate the signature.

Changing the jar file will obviously invalidate the signature.

But as far as I can see then log4j jars are not signed.

Arne

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<spdc3j$9vm$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19397&group=comp.os.vms#19397

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)
Date: Wed, 15 Dec 2021 13:28:03 -0500
Organization: HoffmanLabs LLC
Lines: 23
Message-ID: <spdc3j$9vm$1@dont-email.me>
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com> <spd7k6$776$1@dont-email.me> <spda0p$1e4k$1@gioia.aioe.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="e16fcbb1f08ecd2d4428834c26b10798";
logging-data="10230"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18SIF4bPBxftn196Mc700aYTfyTVSTE3AY="
User-Agent: Unison/2.2
Cancel-Lock: sha1:vv91UJrnvQX3NL4NdrEZ+ygpnfk=
 by: Stephen Hoffman - Wed, 15 Dec 2021 18:28 UTC

On 2021-12-15 17:52:25 +0000, hb said:

> On 12/15/21 6:11 PM, Stephen Hoffman wrote:
>
>> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
>> affected and either need to be zip-mitigated, or needs to be updated as
>> that becomes available, based on that notice, too.
>
> As far as I know, VSI and HPE Tomcat, aka CSWS_JAVA, are based on Apache
> Tomcat and the latter is not affected:
> https://cwiki.apache.org/confluence/display/TOMCAT/Security#Security-Q13.
>
> Whether applications deployed to Tomcat use log4j2 is a different question.

Okay. Sure. Tomcat itself is not vulnerable. Alas, approximately nobody
uses that configuration. Which means that apps using Tomcat will have
to be checked. Which usually means zip mitigation, or updates.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<61ba35ca$0$696$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19399&group=comp.os.vms#19399

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!paganini.bofh.team!news.dns-netz.com!news.freedyn.net!newsfeed.xs4all.nl!newsfeed8.news.xs4all.nl!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 15 Dec 2021 13:36:57 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Content-Language: en-US
Newsgroups: comp.os.vms
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spd7k6$776$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 38
Message-ID: <61ba35ca$0$696$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: d07b3953.news.sunsite.dk
X-Trace: 1639593418 news.sunsite.dk 696 arne@vajhoej.dk/68.9.63.232:61279
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 18:36 UTC

On 12/15/2021 12:11 PM, Stephen Hoffman wrote:
> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
> affected and either need to be zip-mitigated, or needs to be updated as
> that becomes available, based on that notice, too.

Neither HPE nor VSI Java comes with log4j. Java itself does not log
at all- it just provide its own logging framework for use.

Neither HPE nor VSI Tomcat comes with log4j. Tomcat use
java.util.logging aka jul aka jdk14 logging (in a customized flavor
called juli).

So they do not as product have the vulnerability and cannot
be fixed by updating.

But a Tomcat installation may very well have the vulnerability.

Nobody install Tomcat to just run Tomcat. Tomcat is installed to
run Java web application. And those web applications may use log4j.
And that applies to both third part Java web applications and
to home grown Java web applications.

So people should check.

A clean Tomcat install does not have any log4j in lib dir, but
log4j could have been put there after installation (to make it
available for all web apps instead of having to deploy it for each).

And every web app could have it - after war unpack it will be in
webapps/something/WEB-INF/lib.

And as stated previously look out for fatjars as well!

But that is not HPE/VSI responsibility - that is third party/home grower
responsibility.

Arne

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<spdd4k$hiu$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19402&group=comp.os.vms#19402

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: craigbe...@nospam.mac.com (Craig A. Berry)
Newsgroups: comp.os.vms
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Date: Wed, 15 Dec 2021 12:45:39 -0600
Organization: A noiseless patient Spider
Lines: 28
Message-ID: <spdd4k$hiu$1@dont-email.me>
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me> <spda0p$1e4k$1@gioia.aioe.org>
<spdc3j$9vm$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 15 Dec 2021 18:45:40 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="c6535937b63bdce7b6b5af1c225c20f2";
logging-data="18014"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18bpqnuAMV8nOTO5dru45R555DybdKVgC4="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.4.0
Cancel-Lock: sha1:9A65WrjXucDU1dWeRKZs71izCqw=
In-Reply-To: <spdc3j$9vm$1@dont-email.me>
Content-Language: en-US
 by: Craig A. Berry - Wed, 15 Dec 2021 18:45 UTC

On 12/15/21 12:28 PM, Stephen Hoffman wrote:
> On 2021-12-15 17:52:25 +0000, hb said:
>
>> On 12/15/21 6:11 PM, Stephen Hoffman wrote:
>>
>>> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
>>> affected and either need to be zip-mitigated, or needs to be updated as
>>> that becomes available, based on that notice, too.
>>
>> As far as I know, VSI and HPE Tomcat, aka CSWS_JAVA, are based on Apache
>> Tomcat and the latter is not affected:
>> https://cwiki.apache.org/confluence/display/TOMCAT/Security#Security-Q13.
>>
>> Whether applications deployed to Tomcat use log4j2 is a different
>> question.
>
> Okay. Sure. Tomcat itself is not vulnerable. Alas, approximately nobody
> uses that configuration. Which means that apps using Tomcat will have to
> be checked. Which usually means zip mitigation, or updates.

Or changes to the configuration to prevent lookups, which can sometimes
be done my a simple replacement in the configuration file:

perl -pi -e 's/\%m\b/%m{noLookups}/g;' log4j2.xml

or by tweaking various environment variables to do the equivalent. But
just as a finger in the dike until an updated log4j can be incorporated
into the relevant package.

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<spddav$is4$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19404&group=comp.os.vms#19404

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: craigbe...@nospam.mac.com (Craig A. Berry)
Newsgroups: comp.os.vms
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Date: Wed, 15 Dec 2021 12:49:02 -0600
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <spddav$is4$1@dont-email.me>
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me> <spdb86$3s1$1@dont-email.me>
<61ba32f3$0$697$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 15 Dec 2021 18:49:04 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="c6535937b63bdce7b6b5af1c225c20f2";
logging-data="19332"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/XEAzs5ugjug1LAZyRp+w0NylZEfKGdX0="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.4.0
Cancel-Lock: sha1:U32plBEjSEkOI6YPDxPysscbiWc=
In-Reply-To: <61ba32f3$0$697$14726298@news.sunsite.dk>
Content-Language: en-US
 by: Craig A. Berry - Wed, 15 Dec 2021 18:49 UTC

On 12/15/21 12:24 PM, Arne Vajhøj wrote:
> On 12/15/2021 1:13 PM, Craig A. Berry wrote:
>> On 12/15/21 11:11 AM, Stephen Hoffman wrote:
>>> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
>>> affected and either need to be zip-mitigated, or needs to be updated
>>> as that becomes available, based on that notice, too.
>>
>> Does the zip mitigation (deleting a class from a JAR) work on signed jar
>> files?  I would have thought not since I would expect changing any
>> contents of a signed jar file would invalidate the signature.
>
> Changing the jar file will obviously invalidate the signature.
>
> But as far as I can see then log4j jars are not signed.

The application packager, not the library developer, has to do the
signing. So, for example, OpenWebStart apps have to sign all the
downloadable jars with the same code-signing certificate.

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<61ba3b5b$0$704$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19407&group=comp.os.vms#19407

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 15 Dec 2021 14:00:37 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Content-Language: en-US
Newsgroups: comp.os.vms
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me> <spdb86$3s1$1@dont-email.me>
<61ba32f3$0$697$14726298@news.sunsite.dk> <spddav$is4$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spddav$is4$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 28
Message-ID: <61ba3b5b$0$704$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 886e7b74.news.sunsite.dk
X-Trace: 1639594843 news.sunsite.dk 704 arne@vajhoej.dk/68.9.63.232:62036
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 19:00 UTC

On 12/15/2021 1:49 PM, Craig A. Berry wrote:
> On 12/15/21 12:24 PM, Arne Vajhøj wrote:
>> On 12/15/2021 1:13 PM, Craig A. Berry wrote:
>>> On 12/15/21 11:11 AM, Stephen Hoffman wrote:
>>>> Seems that VSI and HPE Java distributions and VSI and HPE Tomcat are
>>>> affected and either need to be zip-mitigated, or needs to be updated
>>>> as that becomes available, based on that notice, too.
>>>
>>> Does the zip mitigation (deleting a class from a JAR) work on signed jar
>>> files?  I would have thought not since I would expect changing any
>>> contents of a signed jar file would invalidate the signature.
>>
>> Changing the jar file will obviously invalidate the signature.
>>
>> But as far as I can see then log4j jars are not signed.
>
> The application packager, not the library developer, has to do the
> signing.  So, for example, OpenWebStart apps have to sign all the
> downloadable jars with the same code-signing certificate.

In that case you will need to have that signer sign the modified
version.

I know very little about Java Web Start, but I would have thought that
it ran with a security manager preventing both access to remote
systems and local access.

Arne

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<61ba3e6f$0$703$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19411&group=comp.os.vms#19411

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 15 Dec 2021 14:13:45 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Content-Language: en-US
Newsgroups: comp.os.vms
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 34
Message-ID: <61ba3e6f$0$703$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 886e7b74.news.sunsite.dk
X-Trace: 1639595632 news.sunsite.dk 703 arne@vajhoej.dk/68.9.63.232:62399
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 19:13 UTC

On 12/15/2021 11:17 AM, Bob Gezelter wrote:
> VMS Software has posted a bulletin about the recent Apache Log4j2
> V2.14.1 (or earlier) vulnerability (CVE-2021-44228) as it affects
> #OpenVMS systems, including remediation for VSI-provided software
> components.
>
>
> The full notice can be retrieved from:
> https://vmssoftware.com/about/news/2021-12-14-cve-2021-44228-comments/
> #Log4j2

They basically say that Tomcat and Kafka client does not use log4j.

And that Axis2 and ActiveMQ use log4j 1.x, which in general is not
good but in relation to this particular problem is good.

And refer a few third party products to third party.

But It is worth noting that this is the easy part.

There are only a few hundreds/thousands "platform products"
using log4j - vendors create patches - customers hopefully
install.

A much bigger problem is those hundreds of thousands/millions
of business applications using log4j from thousands/tens of thousands
of vendors. Just due to the numbers some will be missed.

And then there is the problem of "thingys" having a Java
application using log4j insider. Many people will not be
aware that they run Java. And they can be difficult to
update.

Arne

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<4eadnX5EwfDa3if8nZ2dnUU7-dednZ2d@giganews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19414&group=comp.os.vms#19414

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!buffer1.nntp.dca1.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 15 Dec 2021 13:34:31 -0600
Sender: Dennis Boone <drb@yagi.h-net.org>
From: drb...@ihatespam.msu.edu (Dennis Boone)
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)
Newsgroups: comp.os.vms
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com> <spd7k6$776$1@dont-email.me> <spda0p$1e4k$1@gioia.aioe.org> <spdc3j$9vm$1@dont-email.me> <spdd4k$hiu$1@dont-email.me>
User-Agent: tin/2.4.5-20201224 ("Glen Albyn") (FreeBSD/12.2-RELEASE-p7 (amd64))
Message-ID: <4eadnX5EwfDa3if8nZ2dnUU7-dednZ2d@giganews.com>
Date: Wed, 15 Dec 2021 13:34:31 -0600
Lines: 9
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-8ptEMyDGLPwMX14WNlC1vQDDpepbq88xtjfL7u0Gl3FnF3xDvu2Eq5hZ7nE6yRonF3ExH3d2bP3uxxy!lP0GHTCF0mx+Kfp73T7wt3IvVib4GYXcmLYft627fnw8gCYNjykQW6JPG91IqSyCjmfdAes=
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 1389
 by: Dennis Boone - Wed, 15 Dec 2021 19:34 UTC

> perl -pi -e 's/\%m\b/%m{noLookups}/g;' log4j2.xml

In examining config files in my apps, I saw things like

%-1000m{...}

so I think this perl snippet will be an incomplete fix.

De

Re: VSI Comments on OpenVMS-related Log4j2 vulnerability (CVE-2021-44228)

<spds5h$qn3$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19418&group=comp.os.vms#19418

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: craigbe...@nospam.mac.com (Craig A. Berry)
Newsgroups: comp.os.vms
Subject: Re: VSI Comments on OpenVMS-related Log4j2 vulnerability
(CVE-2021-44228)
Date: Wed, 15 Dec 2021 17:02:07 -0600
Organization: A noiseless patient Spider
Lines: 13
Message-ID: <spds5h$qn3$1@dont-email.me>
References: <ac8d1ee4-fe2c-44fc-8241-a4e8ed2d7680n@googlegroups.com>
<spd7k6$776$1@dont-email.me> <spda0p$1e4k$1@gioia.aioe.org>
<spdc3j$9vm$1@dont-email.me> <spdd4k$hiu$1@dont-email.me>
<4eadnX5EwfDa3if8nZ2dnUU7-dednZ2d@giganews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 15 Dec 2021 23:02:09 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="d0f3223d7227cde8909c20ffc78af538";
logging-data="27363"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18MT0RS8Nd/JPHgLsD9WxF5IpMO07+sWUg="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.4.0
Cancel-Lock: sha1:8BG7Zyfu+rfghiBJE1r/H12aXEM=
In-Reply-To: <4eadnX5EwfDa3if8nZ2dnUU7-dednZ2d@giganews.com>
Content-Language: en-US
 by: Craig A. Berry - Wed, 15 Dec 2021 23:02 UTC

On 12/15/21 1:34 PM, Dennis Boone wrote:
> > perl -pi -e 's/\%m\b/%m{noLookups}/g;' log4j2.xml
>
> In examining config files in my apps, I saw things like
>
> %-1000m{...}
>
> so I think this perl snippet will be an incomplete fix.

Thanks for pointing that out. It worked for the one simple case I
needed to deal with, but it doesn't surprise me you'd need a better
regex for other cases.

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor