From 6e7c14faef40cdd28955694565b57bd6060b3cc5 Mon Sep 17 00:00:00 2001 From: Kelvin Oghenerhoro Omereshone Date: Tue, 8 Feb 2022 01:15:27 +0100 Subject: [PATCH] fix: add warning to query to find log4j vulnerabilities (#4070) * fix: add warning to query to find log4j vulnerabilities * Update docs/01-Using-Fleet/standard-query-library/standard-query-library.yml Co-authored-by: Zach Wasserman Co-authored-by: Zach Wasserman --- .../standard-query-library/standard-query-library.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/01-Using-Fleet/standard-query-library/standard-query-library.yml b/docs/01-Using-Fleet/standard-query-library/standard-query-library.yml index a9ff599846..37fa66b56a 100644 --- a/docs/01-Using-Fleet/standard-query-library/standard-query-library.yml +++ b/docs/01-Using-Fleet/standard-query-library/standard-query-library.yml @@ -562,7 +562,7 @@ kind: query spec: name: Detect active processes with Log4j running platforms: macOS, Linux - description: Returns a list of active processes and the Jar paths which are using Log4j. Version numbers are usually within the Jar filename. + description: Returns a list of active processes and the Jar paths which are using Log4j. Version numbers are usually within the Jar filename. Note: This query is resource intensive and has caused problems on systems with limited swap space. Test on some systems before running this widely. query: | WITH target_jars AS ( SELECT DISTINCT path