Workaround instructions to address CVE-2021-44228 in Tanzu Scheduler v1.5 - v1.6
search cancel

Workaround instructions to address CVE-2021-44228 in Tanzu Scheduler v1.5 - v1.6

book

Article ID: 293821

calendar_today

Updated On:

Products

Operations Manager

Issue/Introduction

CVE-2021-44228 has been determined to impact Tanzu Scheduler via the Apache Log4j open source component it ships. 

This vulnerability and its impact on VMware products are documented in the following VMware Security Advisory (VMSA). Review VMware Response to CVE-2021-44228: Apache Log4j Remote Code Execution (87068) and CVE-2021-44228 – VMSA-2021-0028 before continuing.

Environment

Product Version: 2.10

Resolution

Important Note: Upgrades documented in the aforementioned advisory should be applied to remediate CVE-2021-44228 when available. 


Workaround

Based on the guidance from the Apache log4j security vulnerability disclosure, there are no comprehensive mitigations to CVE-2021-44228 for Tanzu Scheduler versions prior to 1.6.1. We strongly recommend upgrading to Tanzu Scheduler 1.6.1 to ensure that CVE-2021-44228 is properly remediated.If you have already applied the partial mitigation by setting environment variable "LOG4J_FORMAT_MSG_NO_LOOKUPS" , then we do not recommend removing the change or rolling it back.  Tanzu Scheduler is likely less vulnerable with this partial mitigation in place, however we do recommend upgrading as soon as possible.

 

To verify if the workaround for CVE-2021-44228 was previously applied to Tanzu Scheduler, perform the following steps:

1. SSH into the scheduler application:

$ cf ssh scheduler
...

 

2. Verify the “LOG4J_FORMAT_MSG_NO_LOOKUPS” environment variable is set correctly in the scheduler application’s container:

$ env | grep LOG4J
LOG4J_FORMAT_MSG_NO_LOOKUPS=true