<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apache Log4J Vulnerability in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33372#M24378</link>
    <description>&lt;P&gt;Okay I reckon we should be safe then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Dec 2021 13:05:18 GMT</pubDate>
    <dc:creator>Loki</dc:creator>
    <dc:date>2021-12-13T13:05:18Z</dc:date>
    <item>
      <title>Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33365#M24371</link>
      <description>&lt;P&gt;Hi Community, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We got an email from our IT Team regarding Apache Log4J Vulnerability. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to understand if our implementation will be affected by this or not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using the following library or package in our notebooks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;import org.apache.log4j.Logger&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Lokesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 06:31:27 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33365#M24371</guid>
      <dc:creator>Loki</dc:creator>
      <dc:date>2021-12-13T06:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33366#M24372</link>
      <description>&lt;P&gt;It depends.&lt;/P&gt;&lt;P&gt;The vulnerability in question is &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" alt="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank"&gt;CVE-2021-44228&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;Log4j 2.0-beta9 to 2.14.1 are vulnerable. With version 2.15.0 the issue is resolved.&lt;/P&gt;&lt;P&gt;So it depends on the version of Log4j you are running.&lt;/P&gt;&lt;P&gt;You can set 'log4j2.formatMsgNoLookups' to 'true' by addubg ‐Dlog4j2.formatMsgNoLookups=True” to the cluster startup params.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not know the log4j versions per databricks version.&lt;/P&gt;&lt;P&gt;Maybe someone from databricks can tell us which versions are impacted.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 08:06:29 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33366#M24372</guid>
      <dc:creator>-werners-</dc:creator>
      <dc:date>2021-12-13T08:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33367#M24373</link>
      <description>&lt;P&gt;Hi @Lokesh Sharma​&amp;nbsp;, Thank you for reaching out. As you are aware, there has been a &lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/" alt="https://www.lunasec.io/docs/blog/log4j-zero-day/" target="_blank"&gt;&lt;U&gt;0-day discovery&lt;/U&gt;&lt;/A&gt; in Log4j2, the Java Logging library, that could result in Remote Code Execution (RCE) if an affected version of log4j (2.0 &amp;lt;= log4j &amp;lt;= 2.14.1)&amp;nbsp; logs an attacker-controlled string value without proper validation. Please see more details on &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" alt="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank"&gt;&lt;U&gt;CVE-2021-44228&lt;/U&gt;&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Databricks does not directly use a version of log4j known to be affected by the vulnerability within the Databricks platform in a way we understand may be vulnerable to this CVE (e.g., to log user-controlled strings). We have investigated the transitive use of log4j and have not found any evidence of vulnerable usage so far.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, depending on the way you are using log4j within your Databricks dataplane cluster (e.g., if you are processing user-controlled strings though log4j), your use may be potentially vulnerable to the exploit if you have installed and are using an affected version or have installed services that transitively depend on an affected version.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you determine that you have done so, we advise to stop using an affected version of log4j until you upgrade to log4j version 2.15.x or reconfigure any affected service with the &lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/#temporary-mitigation" alt="https://www.lunasec.io/docs/blog/log4j-zero-day/#temporary-mitigation" target="_blank"&gt;&lt;U&gt;known temporary mitigation&lt;/U&gt;&lt;/A&gt; implemented (log4j2.formatMsgNoLookups set to true). Please restart the cluster once you have added the mitigation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The steps to do so are:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Edit the cluster and job with the spark conf “spark.driver.extraJavaOptions” and “spark.executor.extraJavaOptions” set to "-Dlog4j2.formatMsgNoLookups=true"&lt;span class="lia-inline-image-display-wrapper" image-alt="Untitled"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/2221iA994482666D1DA01/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled" alt="Untitled" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;LI&gt;Confirm edit to restart the cluster, or simply trigger a new job run which will use the updated java options.&lt;/LI&gt;&lt;LI&gt;You can confirm that these settings have taken effect in the “Spark UI” tab, under “Environment”&lt;span class="lia-inline-image-display-wrapper" image-alt="Untitled (1)"&gt;&lt;img src="https://community.databricks.com/t5/image/serverpage/image-id/2230iB3FBEB4BB4DBD063/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled (1)" alt="Untitled (1)" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are continuing to investigate whether the Databricks platform may be vulnerable to this security issue and will provide a proactive notification if we determine that you may have been impacted or need to take any further steps.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 09:46:56 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33367#M24373</guid>
      <dc:creator>Prabakar</dc:creator>
      <dc:date>2021-12-13T09:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33368#M24374</link>
      <description>&lt;P&gt;Thanks, Prabakar for getting back to us and for the detailed action steps that need to be followed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you be able to provide an example of "&amp;nbsp;user-controlled strings"&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 10:49:43 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33368#M24374</guid>
      <dc:creator>Loki</dc:creator>
      <dc:date>2021-12-13T10:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33369#M24375</link>
      <description>&lt;P&gt;That can by anything tbh. F.e. you run a fat jar with an impacted log4j version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you only use the logging provided by Databricks I think you are safe.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 10:53:22 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33369#M24375</guid>
      <dc:creator>-werners-</dc:creator>
      <dc:date>2021-12-13T10:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33370#M24376</link>
      <description>&lt;P&gt;Thanks werners&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 10:55:17 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33370#M24376</guid>
      <dc:creator>Loki</dc:creator>
      <dc:date>2021-12-13T10:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33371#M24377</link>
      <description>&lt;P&gt;On most databricks distributions log4j version is 1.2.17&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 11:48:58 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33371#M24377</guid>
      <dc:creator>Hubert-Dudek</dc:creator>
      <dc:date>2021-12-13T11:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33372#M24378</link>
      <description>&lt;P&gt;Okay I reckon we should be safe then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 13:05:18 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33372#M24378</guid>
      <dc:creator>Loki</dc:creator>
      <dc:date>2021-12-13T13:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33373#M24379</link>
      <description>&lt;P&gt;Is log4j 1.2.17 depreciated? Am I wrong?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 14:19:07 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33373#M24379</guid>
      <dc:creator>gmt</dc:creator>
      <dc:date>2021-12-13T14:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33374#M24380</link>
      <description>&lt;P&gt;Is the reason that log4j version 1.2.17 is not vulnerable, because it was not a feature (lookups)  before version 2.0?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 20:55:47 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33374#M24380</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-12-13T20:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4J Vulnerability</title>
      <link>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33376#M24382</link>
      <description>&lt;P&gt;That is correct.  The culprit (lookup feature)  is not present in version 1.x&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 07:34:28 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/apache-log4j-vulnerability/m-p/33376#M24382</guid>
      <dc:creator>-werners-</dc:creator>
      <dc:date>2021-12-14T07:34:28Z</dc:date>
    </item>
  </channel>
</rss>

