IBM Support's response is to push you to the blog
https://www.ibm.com/blogs/psirt/
Which then references the link below. Nothing in the link below tells me anything about the IBM i specifically. I added the environment variable and restarted DB2 Web Query. But beyond that, the steps are Greek to me.
The only application we have externally facing is DB2 Web Query. I asked if it was affected... support just keeps reiterating "our only communication is via the blog"
I have never seen IBM support so "evasive" about an issue.
-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of Rob Berendt
Sent: Monday, December 13, 2021 9:50 AM
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: RE: Remote code execution exploit found in Log4j - CVE-2021-44228
Well does "Admin applications" include "WebSphere Application Server Admin Console"?
If so then:
<snip>
There is a vulnerability in the Apache Log4j open source library used by WebSphere Application Server. This affects the WebSphere Application Server Admin Console and the UDDI Registry Application. This vulnerability has been addressed.
</snip>
https://www.ibm.com/support/pages/node/6525706
Operating system(s):
AIX, HP-UX, IBM i, Linux, Solaris, Windows, z/OS
Rob Berendt
As an Amazon Associate we earn from qualifying purchases.