<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: log4j upgrade for CDH V5.1.1 in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/333037#M231340</link>
    <description>&lt;P&gt;Thanks &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/29629"&gt;@GangWar&lt;/a&gt;&amp;nbsp;, we run patch for log4j provided at&amp;nbsp;&lt;A href="https://github.com/cloudera/cloudera-scripts-for-log4j" target="_blank"&gt;https://github.com/cloudera/cloudera-scripts-for-log4j&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However,&amp;nbsp; &lt;STRONG&gt;how can we verify our env is out from log4j risk? is there some java classes we should verify inside?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Per what we see:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;log4shell-backup directory is empty&lt;/P&gt;&lt;P&gt;2. log4j V1 jars are not removed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;[root@host cloudera-scripts-for-log4j]# &lt;STRONG&gt;cat output_run_log4j_patcher.hVIY8n&lt;/STRONG&gt;&lt;BR /&gt;Using tmp directory '/tmp'&lt;BR /&gt;Removing JNDI from jar files&lt;BR /&gt;Running on '/opt/cloudera'&lt;BR /&gt;Backing up files to '/opt/cloudera/log4shell-backup'&lt;BR /&gt;&lt;STRONG&gt;Completed removing JNDI from jar files&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Completed removing JNDI from nar files&lt;/STRONG&gt;&lt;BR /&gt;Removing JNDI from tar.gz files&lt;BR /&gt;Found an HDFS namenode on this host, removing JNDI from HDFS tar.gz files for platform='common'&lt;BR /&gt;Keytab file is not found or is empty: /var/run/cloudera-scm-agent/process/153-hdfs-NAMENODE/hdfs.keytab. Considering this as a non-secure cluster deployment.&lt;BR /&gt;Tar ball is not available in /user/tez/*. tez is not installed.&lt;BR /&gt;Keytab file is not found or is empty: /var/run/cloudera-scm-agent/process/153-hdfs-NAMENODE/hdfs.keytab. Considering this as a non-secure cluster deployment.&lt;BR /&gt;Tar ball is not available in /user/yarn/mapreduce/mr-framework/. mr is not installed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[root@host cloudera-scripts-for-log4j]# &lt;STRONG&gt;ll /opt/cloudera/log4shell-backup&lt;/STRONG&gt;&lt;BR /&gt;total 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[root@host cloudera-scripts-for-log4j]#&lt;STRONG&gt; ll /opt/cloudera/parcels/CDH-5.11.0-1.cdh5.11.0.p0.34/jars/log4j*&lt;/STRONG&gt;&lt;BR /&gt;-rwxr-xr-x 1 root root 481535 Apr 6 2017 /opt/cloudera/parcels/CDH-5.11.0-1.cdh5.11.0.p0.34/jars/log4j-1.2.16.jar&lt;BR /&gt;-rw-r--r-- 1 root root 489884 Apr 6 2017 /opt/cloudera/parcels/CDH-5.11.0-1.cdh5.11.0.p0.34/jars/log4j-1.2.17.jar&lt;BR /&gt;[root@host cloudera-scripts-for-log4j]# &lt;STRONG&gt;ll /usr/share/cmf/common_jars/log4j*&lt;/STRONG&gt;&lt;BR /&gt;-rw-r--r-- 1 root root 481535 Apr 12 2017 /usr/share/cmf/common_jars/log4j-1.2.16.jar&lt;BR /&gt;-rw-r--r-- 1 root root 489884 Mar 30 2017 /usr/share/cmf/common_jars/log4j-1.2.17.jar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Sun, 02 Jan 2022 12:26:42 GMT</pubDate>
    <dc:creator>noamsh_88</dc:creator>
    <dc:date>2022-01-02T12:26:42Z</dc:date>
    <item>
      <title>log4j upgrade for CDH V5.1.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/332781#M231261</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;We are using Cloudera V5.1.1 with&amp;nbsp;log4j v1.2.17, without option to upgrade Cloudera to later version at this moment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone has suggestion or solution how can we upgrade log4j component to latest version(2.16.0) on CDH V5.1.1?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 12:29:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/332781#M231261</guid>
      <dc:creator>noamsh_88</dc:creator>
      <dc:date>2021-12-23T12:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: log4j upgrade for CDH V5.1.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/332893#M231293</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/94577"&gt;@noamsh_88&lt;/a&gt;&amp;nbsp;It’s not tested that C5.1.1 can work with upgraded log4j as this is no more under support cycle and no testing going on.&amp;nbsp;&lt;/P&gt;&lt;P&gt;However you can give it a try but keep in mind CDH5 is not impacted with log4j vulnerability so you might have to examine first what is desired and then take action.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Dec 2021 13:30:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/332893#M231293</guid>
      <dc:creator>GangWar</dc:creator>
      <dc:date>2021-12-27T13:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: log4j upgrade for CDH V5.1.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/333037#M231340</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/29629"&gt;@GangWar&lt;/a&gt;&amp;nbsp;, we run patch for log4j provided at&amp;nbsp;&lt;A href="https://github.com/cloudera/cloudera-scripts-for-log4j" target="_blank"&gt;https://github.com/cloudera/cloudera-scripts-for-log4j&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However,&amp;nbsp; &lt;STRONG&gt;how can we verify our env is out from log4j risk? is there some java classes we should verify inside?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Per what we see:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;log4shell-backup directory is empty&lt;/P&gt;&lt;P&gt;2. log4j V1 jars are not removed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;[root@host cloudera-scripts-for-log4j]# &lt;STRONG&gt;cat output_run_log4j_patcher.hVIY8n&lt;/STRONG&gt;&lt;BR /&gt;Using tmp directory '/tmp'&lt;BR /&gt;Removing JNDI from jar files&lt;BR /&gt;Running on '/opt/cloudera'&lt;BR /&gt;Backing up files to '/opt/cloudera/log4shell-backup'&lt;BR /&gt;&lt;STRONG&gt;Completed removing JNDI from jar files&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Completed removing JNDI from nar files&lt;/STRONG&gt;&lt;BR /&gt;Removing JNDI from tar.gz files&lt;BR /&gt;Found an HDFS namenode on this host, removing JNDI from HDFS tar.gz files for platform='common'&lt;BR /&gt;Keytab file is not found or is empty: /var/run/cloudera-scm-agent/process/153-hdfs-NAMENODE/hdfs.keytab. Considering this as a non-secure cluster deployment.&lt;BR /&gt;Tar ball is not available in /user/tez/*. tez is not installed.&lt;BR /&gt;Keytab file is not found or is empty: /var/run/cloudera-scm-agent/process/153-hdfs-NAMENODE/hdfs.keytab. Considering this as a non-secure cluster deployment.&lt;BR /&gt;Tar ball is not available in /user/yarn/mapreduce/mr-framework/. mr is not installed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[root@host cloudera-scripts-for-log4j]# &lt;STRONG&gt;ll /opt/cloudera/log4shell-backup&lt;/STRONG&gt;&lt;BR /&gt;total 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[root@host cloudera-scripts-for-log4j]#&lt;STRONG&gt; ll /opt/cloudera/parcels/CDH-5.11.0-1.cdh5.11.0.p0.34/jars/log4j*&lt;/STRONG&gt;&lt;BR /&gt;-rwxr-xr-x 1 root root 481535 Apr 6 2017 /opt/cloudera/parcels/CDH-5.11.0-1.cdh5.11.0.p0.34/jars/log4j-1.2.16.jar&lt;BR /&gt;-rw-r--r-- 1 root root 489884 Apr 6 2017 /opt/cloudera/parcels/CDH-5.11.0-1.cdh5.11.0.p0.34/jars/log4j-1.2.17.jar&lt;BR /&gt;[root@host cloudera-scripts-for-log4j]# &lt;STRONG&gt;ll /usr/share/cmf/common_jars/log4j*&lt;/STRONG&gt;&lt;BR /&gt;-rw-r--r-- 1 root root 481535 Apr 12 2017 /usr/share/cmf/common_jars/log4j-1.2.16.jar&lt;BR /&gt;-rw-r--r-- 1 root root 489884 Mar 30 2017 /usr/share/cmf/common_jars/log4j-1.2.17.jar&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jan 2022 12:26:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/333037#M231340</guid>
      <dc:creator>noamsh_88</dc:creator>
      <dc:date>2022-01-02T12:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: log4j upgrade for CDH V5.1.1</title>
      <link>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/333041#M231344</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/94577"&gt;@noamsh_88&lt;/a&gt;, to recap:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;You started out the thread saying that you are "using Cloudera V5.1.1 with log4j v1.2.17" and asked how you could upgrade to the latest version of log4j on CDH V5.1.1.&lt;/LI&gt;
&lt;LI&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/29629"&gt;@GangWar&lt;/a&gt; replied that CDH 5.x &lt;STRONG&gt;is not and would not be tested with a later version of log4j&lt;/STRONG&gt;, as CDH 5.x has reached &lt;A href="https://www.cloudera.com/legal/policies/support-lifecycle-policy.html" target="_blank" rel="noopener"&gt;End of Support&lt;/A&gt; (open that link and then expand the section labeled "Cloudera Enterprise products" underneath &lt;EM&gt;Current End of Support (EoS) Dates&lt;/EM&gt;) and so if you tried it, you would be on your own.&lt;/LI&gt;
&lt;LI&gt;He also wrote that &lt;STRONG&gt;CDH-5 was not impacted&lt;/STRONG&gt; by the log4j vulnerability &lt;A href="https://www.cve.org/CVERecord?id=CVE-2021-44228" target="_self"&gt;described in log4j2 CVE-2021-44228&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;You replied on 2 Jan that you ran the "patch for log4j provided at &lt;A href="https://github.com/cloudera/cloudera-scripts-for-log4j" target="_blank" rel="noopener"&gt;https://github.com/cloudera/cloudera-scripts-for-log4j"&lt;/A&gt; and asked:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;how can we verify our env is out from log4j risk?&lt;/LI&gt;
&lt;LI&gt;is there some java classes we should verify inside?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The very first sentence of the &lt;FONT face="terminal,monaco,monospace"&gt;README.md&lt;/FONT&gt; file that renders in the browser automatically when one visits &lt;A href="https://github.com/cloudera/cloudera-scripts-for-log4j" target="_self"&gt;the URL you shared earlier&lt;/A&gt; for the &lt;FONT face="terminal,monaco,monospace"&gt;cloudera-scripts-for-log4j&lt;/FONT&gt; reads:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;This repo contains scripts and helper tools to mitigate the critical log4j vulnerability CVE-2021-44228 for Cloudera products affecting all &lt;STRONG&gt;versions of log4j between 2.0 and 2.14.1.&lt;/STRONG&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Emphasis added.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/29629"&gt;@GangWar&lt;/a&gt;&amp;nbsp; indicated, your environment, based on CDH 5.x, should not have had a version of log4j between 2.0 and 2.14.1 installed, and therefore should not have been vulnerable to the the log4j vulnerability described in log4j2 CVE-2021-44228. This is because, as you yourself pointed out in your original post on 23 Dec, you only had&amp;nbsp;log4j v1.2.17 installed in your environment.&amp;nbsp;log4j v1.2.17 is not a&amp;nbsp;version of log4j between 2.0 and 2.14.1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This also explains why, after you ran the script intended for systems using&amp;nbsp;log4j versions&amp;nbsp;between 2.0 and 2.14.1 on a system using log4j v1.2.17, the&amp;nbsp;log4j V1 jars were not removed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But since you ran the script for log4j provided at &lt;A href="https://github.com/cloudera/cloudera-scripts-for-log4j" target="_blank" rel="noopener"&gt;https://github.com/cloudera/cloudera-scripts-for-log4j&lt;/A&gt;&amp;nbsp;anyway and presumably still have it handy, you could check manually for log4j &lt;FONT face="terminal,monaco,monospace"&gt;.jar&lt;/FONT&gt; files in your environment in a similar manner that the script does and verify for yourself that &lt;EM&gt;none&lt;/EM&gt; of those files still have the &lt;FONT face="terminal,monaco,monospace"&gt;JndiLookup.class&lt;/FONT&gt; still present and thereby&amp;nbsp;verify your environment is &lt;EM&gt;not at risk&lt;/EM&gt; to the&amp;nbsp;log4j vulnerability described in log4j2 CVE-2021-44228 (this information is also in the same &lt;FONT face="terminal,monaco,monospace"&gt;README.md&lt;/FONT&gt; file on GitHub where the script you ran is being distributed from).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jan 2022 04:37:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/log4j-upgrade-for-CDH-V5-1-1/m-p/333041#M231344</guid>
      <dc:creator>ask_bill_brooks</dc:creator>
      <dc:date>2022-01-03T04:37:49Z</dc:date>
    </item>
  </channel>
</rss>

