<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: CVE-2022-25168 in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/351895#M236396</link>
    <description>&lt;P&gt;For CDH, HDP, HDF, and CDP Private Cloud and Data Services, TSB 2021-545 - Critical vulnerability in log4j2 CVE-2021-44228 - has been resolved.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Sep 2022 23:19:50 GMT</pubDate>
    <dc:creator>ShariAllen</dc:creator>
    <dc:date>2022-09-09T23:19:50Z</dc:date>
    <item>
      <title>CVE-2022-25168</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/349753#M235759</link>
      <description>&lt;P&gt;Hello, I would like to know if this CVE which impacts Apache Hadoop is already resolve into HDP or CDP products ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Apache Hadoop’s FileUtil.unTar(File, File) API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Versions affected&lt;/STRONG&gt;: 2.0.0 to 2.10.1, 3.0.0-alpha1 to 3.2.3, 3.3.0 to 3.3.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25168" target="_blank" rel="noopener"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25168&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And, do we have any&amp;nbsp;&lt;SPAN&gt;precautions&lt;/SPAN&gt; other than upgrading?&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 08:16:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/349753#M235759</guid>
      <dc:creator>Cqcmcc</dc:creator>
      <dc:date>2022-08-09T08:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-25168</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/349758#M235761</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/24355"&gt;@Cqcmcc&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This CVE is fixed in CDP 7.1.7 SP1. I&lt;SPAN class="Y2IQFc"&gt;t is recommended that you upgrade to this version and above to resolve this issue. As of now there is no precautionary step to mitigate this other than a patch or upgrade.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Y2IQFc"&gt;&lt;I&gt;-&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;Was your question answered? Please take some time to click on “Accept as Solution” below this post.&lt;/I&gt;&lt;BR /&gt;&lt;I&gt;If you find a reply useful, say thanks by clicking on the thumbs up button.&lt;/I&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2022 09:17:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/349758#M235761</guid>
      <dc:creator>rki_</dc:creator>
      <dc:date>2022-08-09T09:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-25168</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/350202#M235920</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/24355"&gt;@Cqcmcc&lt;/a&gt;,&amp;nbsp;Has the reply helped resolve your issue? If so, please mark the appropriate reply as the solution, as it will make it easier for others to find the answer in the future.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 06:04:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/350202#M235920</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2022-08-17T06:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-25168</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/351895#M236396</link>
      <description>&lt;P&gt;For CDH, HDP, HDF, and CDP Private Cloud and Data Services, TSB 2021-545 - Critical vulnerability in log4j2 CVE-2021-44228 - has been resolved.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 23:19:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/351895#M236396</guid>
      <dc:creator>ShariAllen</dc:creator>
      <dc:date>2022-09-09T23:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-25168</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/353377#M236700</link>
      <description>&lt;P&gt;Gratitude for the update The issue is now fixed. thanks&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 07:29:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/353377#M236700</guid>
      <dc:creator>MaceyNikolaus</dc:creator>
      <dc:date>2022-09-27T07:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-25168</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/368822#M240285</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80393"&gt;@rki_&lt;/a&gt; , as we stil have some clusters running with HDP 2.6.5 (HDP 2.6.5.363-1)for some months before moving to CDP, does exist workarounds to mitigate this CVE ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for your answer.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2023 17:35:27 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-25168/m-p/368822#M240285</guid>
      <dc:creator>jeromedruais</dc:creator>
      <dc:date>2023-04-18T17:35:27Z</dc:date>
    </item>
  </channel>
</rss>

