<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log4j Vulnerability for SAS Deployment Manager in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/808400#M24201</link>
    <description>Thanks for pointing out that statement. I have to explain why the files should stay to qualify for a waiver, or delete them. This will help.&lt;BR /&gt;</description>
    <pubDate>Mon, 18 Apr 2022 19:36:44 GMT</pubDate>
    <dc:creator>CarlZeigler</dc:creator>
    <dc:date>2022-04-18T19:36:44Z</dc:date>
    <item>
      <title>Log4j Vulnerability for SAS Deployment Manager</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/787786#M23590</link>
      <description>&lt;P&gt;In a few other posts there were notes about SAS EG and other desktop applications are not affected by the log4j vulnerability. However, when I run the suggested search I do find a log4j file under SAS Deployment Manager. The manual resolution for this file on the server is to zip the file up. Can this file be simply deleted on the desktop to remediate the vulnerability? I do see there is a windows version of&amp;nbsp;loguccino.&amp;nbsp;&amp;nbsp;Is it necessary to have administrator rights to a workstation to run this tool?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 15:20:32 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/787786#M23590</guid>
      <dc:creator>DJWanna</dc:creator>
      <dc:date>2021-12-30T15:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j Vulnerability for SAS Deployment Manager</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/787977#M23591</link>
      <description>&lt;P&gt;I too found log4j files in Deployment Manager. I think it is safe to follow the server instructions to use &lt;A href="https://github.com/sassoftware/loguccino" target="_blank"&gt;loguccino&lt;/A&gt; to remove the offending software.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jan 2022 08:35:16 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/787977#M23591</guid>
      <dc:creator>SASKiwi</dc:creator>
      <dc:date>2022-01-01T08:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j Vulnerability for SAS Deployment Manager</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/787998#M23592</link>
      <description>I agree. While SAS Deployment Manager is a client-side tool and not associated with any running service that might be vulnerable to these exploits, I understand the desire to make all log4j jar files show as "clean" in scans. So it should be safe to use the provided tools to remediate.</description>
      <pubDate>Sat, 01 Jan 2022 20:14:48 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/787998#M23592</guid>
      <dc:creator>ChrisHemedinger</dc:creator>
      <dc:date>2022-01-01T20:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j Vulnerability for SAS Deployment Manager</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/807789#M24185</link>
      <description>The sas supplied loguccino scanner is finding log4j vulnerabilities in the M7 SAS Depot. If I use the patch step to fix these files, an install later fails with invalid checksums…. Is there a workaround?</description>
      <pubDate>Thu, 14 Apr 2022 12:42:00 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/807789#M24185</guid>
      <dc:creator>CarlZeigler</dc:creator>
      <dc:date>2022-04-14T12:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j Vulnerability for SAS Deployment Manager</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/807794#M24186</link>
      <description>&lt;P&gt;Hi Carl.&amp;nbsp; Please see the "Directories to Target" section of the Instructions for Loguccino.&amp;nbsp; Specifically the "Caution" statement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://go.documentation.sas.com/doc/en/log4j/1.0/p1pymcg1f06injn10rho5mkmmhe4.htm" target="_blank"&gt;https://go.documentation.sas.com/doc/en/log4j/1.0/p1pymcg1f06injn10rho5mkmmhe4.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2022 12:59:57 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/807794#M24186</guid>
      <dc:creator>ronf_sas</dc:creator>
      <dc:date>2022-04-14T12:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j Vulnerability for SAS Deployment Manager</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/808400#M24201</link>
      <description>Thanks for pointing out that statement. I have to explain why the files should stay to qualify for a waiver, or delete them. This will help.&lt;BR /&gt;</description>
      <pubDate>Mon, 18 Apr 2022 19:36:44 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Log4j-Vulnerability-for-SAS-Deployment-Manager/m-p/808400#M24201</guid>
      <dc:creator>CarlZeigler</dc:creator>
      <dc:date>2022-04-18T19:36:44Z</dc:date>
    </item>
  </channel>
</rss>

