This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 26bc603  Automatic Site Publish by Buildbot
26bc603 is described below

commit 26bc603ac887c95b03562b9badeee52d82cc953a
Author: buildbot <[email protected]>
AuthorDate: Fri Dec 10 18:07:36 2021 +0000

    Automatic Site Publish by Buildbot
---
 output/feeds/all.atom.xml           | 15 ++++++++++++---
 output/feeds/solr/security.atom.xml | 15 ++++++++++++---
 output/news.html                    | 17 +++++++++++++----
 output/security.html                | 19 ++++++++++++++-----
 4 files changed, 51 insertions(+), 15 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 57de757..759a4a1 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr</title><link 
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
 Solr affected by Apache Log4J CVE-2021-44228: JNDI features do not protect 
against attacker controlled LDAP and other JNDI related endpoints</title><link 
href="/apache-solr-affected-by-apache-log4j-cve-2021-44228-jndi- [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr</title><link 
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
 Solr affected by Apache Log4J CVE-2021-44228</title><link 
href="/apache-solr-affected-by-apache-log4j-cve-2021-44228.html" 
rel="alternate"></link><published>2021-12-12T00:00:00+00:00</published><updated>2021-12-12T00:0
 [...]
 Critical&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
 7.0.0 to 7.7.3
@@ -13,10 +13,11 @@ Critical&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.&lt;/p&gt;
 &lt;p&gt;Apache Solr releases prior to 7.0 (i.e. all Solr 5 and Solr 6 
releases) use log4j 1.2.17 which may be vulnerable for installations using 
non-default logging configurations. To determine you if you are vulnerable 
please consult the Log4J security page.&lt;/p&gt;
+&lt;p&gt;The Prometheus Exporter Contrib is similarly separately 
affected.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
-Any of the following are enough to prevent this vulnerability:&lt;/p&gt;
+Any of the following are enough to prevent this vulnerability for Solr 
servers:&lt;/p&gt;
 &lt;ul&gt;
-&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the log4j2 
dependancy.&lt;/li&gt;
+&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the log4j2 
dependency.&lt;/li&gt;
 &lt;li&gt;Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.&lt;/li&gt;
 &lt;li&gt;(Linux/MacOS) Edit your &lt;code&gt;solr.in.sh&lt;/code&gt; file to 
include:
   &lt;code&gt;SOLR_OPTS="$SOLR_OPTS 
-Dlog4j2.formatMsgNoLookups=true"&lt;/code&gt;&lt;/li&gt;
@@ -24,6 +25,14 @@ Any of the following are enough to prevent this 
vulnerability:&lt;/p&gt;
   &lt;code&gt;set SOLR_OPTS=%SOLR_OPTS% 
-Dlog4j2.formatMsgNoLookups=true&lt;/code&gt;&lt;/li&gt;
 &lt;li&gt;Follow any of the other mitgations listed at &lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
+&lt;p&gt;The vulnerability in the Prometheus Exporter Contrib can be mitigated 
by any of the following:&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the log4j2 
dependency.&lt;/li&gt;
+&lt;li&gt;Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.&lt;/li&gt;
+&lt;li&gt;Edit your &lt;code&gt;solr-exporter&lt;/code&gt; script to include
+  &lt;code&gt;JAVA_OPTS="$JAVA_OPTS 
-Dlog4j2.formatMsgNoLookups=true"&lt;/code&gt;&lt;/li&gt;
+&lt;li&gt;Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html&lt;/li&gt;
+&lt;/ul&gt;
 &lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
 &lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>Apache Solr Operator™ 
v0.5.0 available</title><link 
href="/apache-solr-operatortm-v050-available.html" 
rel="alternate"></link><published>2021-11-16T00:00:00+00:00</published><updated>2021-11-16T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2021- [...]
 &lt;p&gt;The Apache Solr Operator is a safe and easy way of managing a Solr 
ecosystem in Kubernetes.&lt;/p&gt;
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index 61532ef..5460f85 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -1,5 +1,5 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
 Solr affected by Apache Log4J CVE-2021-44228: JNDI features do not protect 
against attacker controlled LDAP and other JNDI related endpoints</title><link 
href="/apache-solr-affected-by-apache- [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
 Solr affected by Apache Log4J CVE-2021-44228</title><link 
href="/apache-solr-affected-by-apache-log4j-cve-2021-44228.html" 
rel="alternate"></link><published>2021-12-12T00:00:00+00:00</publishe [...]
 Critical&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
 7.0.0 to 7.7.3
@@ -13,10 +13,11 @@ Critical&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.&lt;/p&gt;
 &lt;p&gt;Apache Solr releases prior to 7.0 (i.e. all Solr 5 and Solr 6 
releases) use log4j 1.2.17 which may be vulnerable for installations using 
non-default logging configurations. To determine you if you are vulnerable 
please consult the Log4J security page.&lt;/p&gt;
+&lt;p&gt;The Prometheus Exporter Contrib is similarly separately 
affected.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
-Any of the following are enough to prevent this vulnerability:&lt;/p&gt;
+Any of the following are enough to prevent this vulnerability for Solr 
servers:&lt;/p&gt;
 &lt;ul&gt;
-&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the log4j2 
dependancy.&lt;/li&gt;
+&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the log4j2 
dependency.&lt;/li&gt;
 &lt;li&gt;Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.&lt;/li&gt;
 &lt;li&gt;(Linux/MacOS) Edit your &lt;code&gt;solr.in.sh&lt;/code&gt; file to 
include:
   &lt;code&gt;SOLR_OPTS="$SOLR_OPTS 
-Dlog4j2.formatMsgNoLookups=true"&lt;/code&gt;&lt;/li&gt;
@@ -24,6 +25,14 @@ Any of the following are enough to prevent this 
vulnerability:&lt;/p&gt;
   &lt;code&gt;set SOLR_OPTS=%SOLR_OPTS% 
-Dlog4j2.formatMsgNoLookups=true&lt;/code&gt;&lt;/li&gt;
 &lt;li&gt;Follow any of the other mitgations listed at &lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
+&lt;p&gt;The vulnerability in the Prometheus Exporter Contrib can be mitigated 
by any of the following:&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the log4j2 
dependency.&lt;/li&gt;
+&lt;li&gt;Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.&lt;/li&gt;
+&lt;li&gt;Edit your &lt;code&gt;solr-exporter&lt;/code&gt; script to include
+  &lt;code&gt;JAVA_OPTS="$JAVA_OPTS 
-Dlog4j2.formatMsgNoLookups=true"&lt;/code&gt;&lt;/li&gt;
+&lt;li&gt;Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html&lt;/li&gt;
+&lt;/ul&gt;
 &lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
 &lt;a 
href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2021-27905: SSRF 
vulnerability with the Replication handler</title><link 
href="/cve-2021-27905-ssrf-vulnerability-with-the-replication-handler.html" 
rel="alternate"></link><published>2021-04-12T00:00:00+00:00</published><updated>2021-04-12T00:00:00+00:00</updated><author><name
 [...]
 High&lt;/p&gt;
diff --git a/output/news.html b/output/news.html
index 8c5cf6c..46ec753 100644
--- a/output/news.html
+++ b/output/news.html
@@ -132,8 +132,8 @@
   <h1 id="solr-news">Solr<sup>™</sup> News<a class="headerlink" 
href="#solr-news" title="Permanent link">¶</a></h1>
   <p>You may also read these news as an <a 
href="/feeds/solr/news.atom.xml">ATOM feed</a>.</p>
 
-  <h2 
id="apache-solr-affected-by-apache-log4j-cve-2021-44228-jndi-features-do-not-protect-against-attacker-controlled-ldap-and-other-jndi-related-endpoints">12
 December 2021, Apache Solr affected by Apache Log4J CVE-2021-44228: JNDI 
features do not protect against attacker controlled LDAP and other JNDI related 
endpoints
-    <a class="headerlink" 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228-jndi-features-do-not-protect-against-attacker-controlled-ldap-and-other-jndi-related-endpoints"
 title="Permanent link">¶</a>
+  <h2 id="apache-solr-affected-by-apache-log4j-cve-2021-44228">12 December 
2021, Apache Solr affected by Apache Log4J CVE-2021-44228
+    <a class="headerlink" 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228" title="Permanent 
link">¶</a>
   </h2>
   <p><strong>Severity:</strong>
 Critical</p>
@@ -143,10 +143,11 @@ Critical</p>
 <p><strong>Description:</strong>
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.</p>
 <p>Apache Solr releases prior to 7.0 (i.e. all Solr 5 and Solr 6 releases) use 
log4j 1.2.17 which may be vulnerable for installations using non-default 
logging configurations. To determine you if you are vulnerable please consult 
the Log4J security page.</p>
+<p>The Prometheus Exporter Contrib is similarly separately affected.</p>
 <p><strong>Mitigation:</strong>
-Any of the following are enough to prevent this vulnerability:</p>
+Any of the following are enough to prevent this vulnerability for Solr 
servers:</p>
 <ul>
-<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the log4j2 dependancy.</li>
+<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the log4j2 dependency.</li>
 <li>Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.</li>
 <li>(Linux/MacOS) Edit your <code>solr.in.sh</code> file to include:
   <code>SOLR_OPTS="$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true"</code></li>
@@ -154,6 +155,14 @@ Any of the following are enough to prevent this 
vulnerability:</p>
   <code>set SOLR_OPTS=%SOLR_OPTS% -Dlog4j2.formatMsgNoLookups=true</code></li>
 <li>Follow any of the other mitgations listed at <a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></li>
 </ul>
+<p>The vulnerability in the Prometheus Exporter Contrib can be mitigated by 
any of the following:</p>
+<ul>
+<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the log4j2 dependency.</li>
+<li>Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.</li>
+<li>Edit your <code>solr-exporter</code> script to include
+  <code>JAVA_OPTS="$JAVA_OPTS -Dlog4j2.formatMsgNoLookups=true"</code></li>
+<li>Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html</li>
+</ul>
 <p><strong>References:</strong>
 <a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></p>
   <h2 id="apache-solrtm-8110-available">16 November 2021, Apache Solr™ 8.11.0 
available
diff --git a/output/security.html b/output/security.html
index d13d081..b60027b 100644
--- a/output/security.html
+++ b/output/security.html
@@ -142,7 +142,7 @@ Then please disclose responsibly by following <a 
href="https://www.apache.org/se
         <tr>
             <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228";>CVE-2021-44228</a></td>
             <td>2021-12-12</td>
-            <td><a 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228-jndi-features-do-not-protect-against-attacker-controlled-ldap-and-other-jndi-related-endpoints">Apache
 Solr affected by Apache Log4J CVE-2021-44228: JNDI features do not protect 
against attacker controlled LDAP and other JNDI related endpoints</a></td>
+            <td><a 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228">Apache Solr 
affected by Apache Log4J CVE-2021-44228</a></td>
         </tr>
         <tr>
             <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-27905";>CVE-2021-27905</a></td>
@@ -216,8 +216,8 @@ Then please disclose responsibly by following <a 
href="https://www.apache.org/se
         </tr>
     </table>
 
-  <h2 
id="apache-solr-affected-by-apache-log4j-cve-2021-44228-jndi-features-do-not-protect-against-attacker-controlled-ldap-and-other-jndi-related-endpoints">2021-12-12,
 Apache Solr affected by Apache Log4J CVE-2021-44228: JNDI features do not 
protect against attacker controlled LDAP and other JNDI related endpoints
-    <a class="headerlink" 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228-jndi-features-do-not-protect-against-attacker-controlled-ldap-and-other-jndi-related-endpoints"
 title="Permanent link">¶</a>
+  <h2 id="apache-solr-affected-by-apache-log4j-cve-2021-44228">2021-12-12, 
Apache Solr affected by Apache Log4J CVE-2021-44228
+    <a class="headerlink" 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228" title="Permanent 
link">¶</a>
   </h2>
   <p><strong>Severity:</strong>
 Critical</p>
@@ -227,10 +227,11 @@ Critical</p>
 <p><strong>Description:</strong>
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.</p>
 <p>Apache Solr releases prior to 7.0 (i.e. all Solr 5 and Solr 6 releases) use 
log4j 1.2.17 which may be vulnerable for installations using non-default 
logging configurations. To determine you if you are vulnerable please consult 
the Log4J security page.</p>
+<p>The Prometheus Exporter Contrib is similarly separately affected.</p>
 <p><strong>Mitigation:</strong>
-Any of the following are enough to prevent this vulnerability:</p>
+Any of the following are enough to prevent this vulnerability for Solr 
servers:</p>
 <ul>
-<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the log4j2 dependancy.</li>
+<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the log4j2 dependency.</li>
 <li>Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.</li>
 <li>(Linux/MacOS) Edit your <code>solr.in.sh</code> file to include:
   <code>SOLR_OPTS="$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true"</code></li>
@@ -238,6 +239,14 @@ Any of the following are enough to prevent this 
vulnerability:</p>
   <code>set SOLR_OPTS=%SOLR_OPTS% -Dlog4j2.formatMsgNoLookups=true</code></li>
 <li>Follow any of the other mitgations listed at <a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></li>
 </ul>
+<p>The vulnerability in the Prometheus Exporter Contrib can be mitigated by 
any of the following:</p>
+<ul>
+<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the log4j2 dependency.</li>
+<li>Manually update the version of log4j2 on your runtime classpath and 
restart your Solr application.</li>
+<li>Edit your <code>solr-exporter</code> script to include
+  <code>JAVA_OPTS="$JAVA_OPTS -Dlog4j2.formatMsgNoLookups=true"</code></li>
+<li>Follow any of the other mitgations listed at 
https://logging.apache.org/log4j/2.x/security.html</li>
+</ul>
 <p><strong>References:</strong>
 <a 
href="https://logging.apache.org/log4j/2.x/security.html";>https://logging.apache.org/log4j/2.x/security.html</a></p>
   <hr/>

Reply via email to