This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 1fc5164  Automatic Site Publish by Buildbot
1fc5164 is described below

commit 1fc51648f4a12a5f2e312a0674ebb6d256805745
Author: buildbot <[email protected]>
AuthorDate: Fri Dec 10 17:48:28 2021 +0000

    Automatic Site Publish by Buildbot
---
 output/feeds/all.atom.xml           | 4 ++--
 output/feeds/solr/security.atom.xml | 4 ++--
 output/news.html                    | 4 ++--
 output/security.html                | 4 ++--
 4 files changed, 8 insertions(+), 8 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 759c585..57de757 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -22,10 +22,10 @@ Any of the following are enough to prevent this 
vulnerability:&lt;/p&gt;
   &lt;code&gt;SOLR_OPTS="$SOLR_OPTS 
-Dlog4j2.formatMsgNoLookups=true"&lt;/code&gt;&lt;/li&gt;
 &lt;li&gt;(Windows) Edit your &lt;code&gt;solr.in.cmd&lt;/code&gt; file to 
include:
   &lt;code&gt;set SOLR_OPTS=%SOLR_OPTS% 
-Dlog4j2.formatMsgNoLookups=true&lt;/code&gt;&lt;/li&gt;
-&lt;li&gt;Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html&lt;/li&gt;
+&lt;li&gt;Follow any of the other mitgations listed at &lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
-https://logging.apache.org/log4j/2.x/security.html&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>Apache Solr Operator™ 
v0.5.0 available</title><link 
href="/apache-solr-operatortm-v050-available.html" 
rel="alternate"></link><published>2021-11-16T00:00:00+00:00</published><updated>2021-11-16T00:00:00+00:00</updated><author><name>Solr
 
Developers</name></author><id>tag:None,2021-11-16:/apache-solr-operatortm-v050-available.html</id><summary
 type="html">&l [...]
+&lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>Apache Solr Operator™ 
v0.5.0 available</title><link 
href="/apache-solr-operatortm-v050-available.html" 
rel="alternate"></link><published>2021-11-16T00:00:00+00:00</published><updated>2021-11-16T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2021- [...]
 &lt;p&gt;The Apache Solr Operator is a safe and easy way of managing a Solr 
ecosystem in Kubernetes.&lt;/p&gt;
 &lt;p&gt;This release contains numerous bug fixes, optimizations, and 
improvements, some of which are highlighted below …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;The Apache Solr PMC is pleased to announce the release of 
the Apache Solr Operator v0.5.0.&lt;/p&gt;
 &lt;p&gt;The Apache Solr Operator is a safe and easy way of managing a Solr 
ecosystem in Kubernetes.&lt;/p&gt;
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index b8cee3a..61532ef 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -22,10 +22,10 @@ Any of the following are enough to prevent this 
vulnerability:&lt;/p&gt;
   &lt;code&gt;SOLR_OPTS="$SOLR_OPTS 
-Dlog4j2.formatMsgNoLookups=true"&lt;/code&gt;&lt;/li&gt;
 &lt;li&gt;(Windows) Edit your &lt;code&gt;solr.in.cmd&lt;/code&gt; file to 
include:
   &lt;code&gt;set SOLR_OPTS=%SOLR_OPTS% 
-Dlog4j2.formatMsgNoLookups=true&lt;/code&gt;&lt;/li&gt;
-&lt;li&gt;Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html&lt;/li&gt;
+&lt;li&gt;Follow any of the other mitgations listed at &lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
-https://logging.apache.org/log4j/2.x/security.html&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2021-27905: SSRF 
vulnerability with the Replication handler</title><link 
href="/cve-2021-27905-ssrf-vulnerability-with-the-replication-handler.html" 
rel="alternate"></link><published>2021-04-12T00:00:00+00:00</published><updated>2021-04-12T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2021-04-12:/cve-2021-27905-ssrf- [...]
+&lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2021-27905: SSRF 
vulnerability with the Replication handler</title><link 
href="/cve-2021-27905-ssrf-vulnerability-with-the-replication-handler.html" 
rel="alternate"></link><published>2021-04-12T00:00:00+00:00</published><updated>2021-04-12T00:00:00+00:00</updated><author><name
 [...]
 High&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
 7.0.0 to 7.7.3
diff --git a/output/news.html b/output/news.html
index 2df99ce..8c5cf6c 100644
--- a/output/news.html
+++ b/output/news.html
@@ -152,10 +152,10 @@ Any of the following are enough to prevent this 
vulnerability:</p>
   <code>SOLR_OPTS="$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true"</code></li>
 <li>(Windows) Edit your <code>solr.in.cmd</code> file to include:
   <code>set SOLR_OPTS=%SOLR_OPTS% -Dlog4j2.formatMsgNoLookups=true</code></li>
-<li>Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html</li>
+<li>Follow any of the other mitgations listed at <a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></li>
 </ul>
 <p><strong>References:</strong>
-https://logging.apache.org/log4j/2.x/security.html</p>
+<a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></p>
   <h2 id="apache-solrtm-8110-available">16 November 2021, Apache Solr™ 8.11.0 
available
     <a class="headerlink" href="#apache-solrtm-8110-available" 
title="Permanent link">¶</a>
   </h2>
diff --git a/output/security.html b/output/security.html
index 529c400..d13d081 100644
--- a/output/security.html
+++ b/output/security.html
@@ -236,10 +236,10 @@ Any of the following are enough to prevent this 
vulnerability:</p>
   <code>SOLR_OPTS="$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true"</code></li>
 <li>(Windows) Edit your <code>solr.in.cmd</code> file to include:
   <code>set SOLR_OPTS=%SOLR_OPTS% -Dlog4j2.formatMsgNoLookups=true</code></li>
-<li>Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html</li>
+<li>Follow any of the other mitgations listed at <a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></li>
 </ul>
 <p><strong>References:</strong>
-https://logging.apache.org/log4j/2.x/security.html</p>
+<a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></p>
   <hr/>
   <h2 
id="cve-2021-27905-ssrf-vulnerability-with-the-replication-handler">2021-04-12, 
CVE-2021-27905: SSRF vulnerability with the Replication handler
     <a class="headerlink" 
href="#cve-2021-27905-ssrf-vulnerability-with-the-replication-handler" 
title="Permanent link">¶</a>

Reply via email to