This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new e7f5f41  Automatic Site Publish by Buildbot
e7f5f41 is described below

commit e7f5f412823802c1c8c3ee52469fcad627805845
Author: buildbot <[email protected]>
AuthorDate: Wed Dec 15 20:25:28 2021 +0000

    Automatic Site Publish by Buildbot
---
 output/feeds/all.atom.xml           | 5 ++++-
 output/feeds/solr/security.atom.xml | 5 ++++-
 output/news.html                    | 5 ++++-
 output/security.html                | 5 ++++-
 4 files changed, 16 insertions(+), 4 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 458a7a0..ce1df9d 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -12,10 +12,13 @@ Critical&lt;/p&gt;
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.&lt;/p&gt;
 &lt;p&gt;Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 
through 7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see &lt;a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"&gt;https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126&lt;/a&gt;
 for discussion.&lt;/p&gt;
 &lt;p&gt;Solr's Prometheus Exporter uses Log4J as well but it does not log 
user input or data, so we don't see a risk there.&lt;/p&gt;
+&lt;p&gt;Apache Solr releases are &lt;em&gt;not&lt;/em&gt; vulnerable to the 
followup CVE-2021-45046, because the MDC patterns used by Solr are for the
+collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
+&lt;code&gt;log4j2.formatMsgNoLookups=true&lt;/code&gt; (as described below) 
is suitable to mitigate.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
 Any of the following are enough to prevent this vulnerability for Solr 
servers:&lt;/p&gt;
 &lt;ul&gt;
-&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the Log4J 
dependency.&lt;/li&gt;
+&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version (&lt;code&gt;&amp;gt;= 
2.16.0&lt;/code&gt;) of the Log4J dependency.&lt;/li&gt;
 &lt;li&gt;If you are using Solr's official docker image, it has already been 
mitigated in all versions listed as supported on Docker Hub: &lt;a 
href="https://hub.docker.com/_/solr"&gt;https://hub.docker.com/_/solr&lt;/a&gt;.
  You may need to re-pull the image.&lt;/li&gt;
 &lt;li&gt;Manually update the version of Log4J on your runtime classpath and 
restart your Solr application.&lt;/li&gt;
 &lt;li&gt;(Linux/MacOS) Edit your &lt;code&gt;solr.in.sh&lt;/code&gt; file to 
include:
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index 2fcccd5..1f12407 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -12,10 +12,13 @@ Critical&lt;/p&gt;
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.&lt;/p&gt;
 &lt;p&gt;Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 
through 7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see &lt;a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"&gt;https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126&lt;/a&gt;
 for discussion.&lt;/p&gt;
 &lt;p&gt;Solr's Prometheus Exporter uses Log4J as well but it does not log 
user input or data, so we don't see a risk there.&lt;/p&gt;
+&lt;p&gt;Apache Solr releases are &lt;em&gt;not&lt;/em&gt; vulnerable to the 
followup CVE-2021-45046, because the MDC patterns used by Solr are for the
+collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
+&lt;code&gt;log4j2.formatMsgNoLookups=true&lt;/code&gt; (as described below) 
is suitable to mitigate.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
 Any of the following are enough to prevent this vulnerability for Solr 
servers:&lt;/p&gt;
 &lt;ul&gt;
-&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version of the Log4J 
dependency.&lt;/li&gt;
+&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when 
available), which will include an updated version (&lt;code&gt;&amp;gt;= 
2.16.0&lt;/code&gt;) of the Log4J dependency.&lt;/li&gt;
 &lt;li&gt;If you are using Solr's official docker image, it has already been 
mitigated in all versions listed as supported on Docker Hub: &lt;a 
href="https://hub.docker.com/_/solr"&gt;https://hub.docker.com/_/solr&lt;/a&gt;.
  You may need to re-pull the image.&lt;/li&gt;
 &lt;li&gt;Manually update the version of Log4J on your runtime classpath and 
restart your Solr application.&lt;/li&gt;
 &lt;li&gt;(Linux/MacOS) Edit your &lt;code&gt;solr.in.sh&lt;/code&gt; file to 
include:
diff --git a/output/news.html b/output/news.html
index b24b424..c85d5d4 100644
--- a/output/news.html
+++ b/output/news.html
@@ -143,10 +143,13 @@ Critical</p>
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.</p>
 <p>Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 through 
7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see <a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126";>https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126</a>
 for discussion.</p>
 <p>Solr's Prometheus Exporter uses Log4J as well but it does not log user 
input or data, so we don't see a risk there.</p>
+<p>Apache Solr releases are <em>not</em> vulnerable to the followup 
CVE-2021-45046, because the MDC patterns used by Solr are for the
+collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
+<code>log4j2.formatMsgNoLookups=true</code> (as described below) is suitable 
to mitigate.</p>
 <p><strong>Mitigation:</strong>
 Any of the following are enough to prevent this vulnerability for Solr 
servers:</p>
 <ul>
-<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the Log4J dependency.</li>
+<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version (<code>&gt;= 2.16.0</code>) of the Log4J 
dependency.</li>
 <li>If you are using Solr's official docker image, it has already been 
mitigated in all versions listed as supported on Docker Hub: <a 
href="https://hub.docker.com/_/solr";>https://hub.docker.com/_/solr</a>.  You 
may need to re-pull the image.</li>
 <li>Manually update the version of Log4J on your runtime classpath and restart 
your Solr application.</li>
 <li>(Linux/MacOS) Edit your <code>solr.in.sh</code> file to include:
diff --git a/output/security.html b/output/security.html
index 2ec4f82..e750fe0 100644
--- a/output/security.html
+++ b/output/security.html
@@ -227,10 +227,13 @@ Critical</p>
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.</p>
 <p>Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 through 
7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see <a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126";>https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126</a>
 for discussion.</p>
 <p>Solr's Prometheus Exporter uses Log4J as well but it does not log user 
input or data, so we don't see a risk there.</p>
+<p>Apache Solr releases are <em>not</em> vulnerable to the followup 
CVE-2021-45046, because the MDC patterns used by Solr are for the
+collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
+<code>log4j2.formatMsgNoLookups=true</code> (as described below) is suitable 
to mitigate.</p>
 <p><strong>Mitigation:</strong>
 Any of the following are enough to prevent this vulnerability for Solr 
servers:</p>
 <ul>
-<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version of the Log4J dependency.</li>
+<li>Upgrade to <code>Solr 8.11.1</code> or greater (when available), which 
will include an updated version (<code>&gt;= 2.16.0</code>) of the Log4J 
dependency.</li>
 <li>If you are using Solr's official docker image, it has already been 
mitigated in all versions listed as supported on Docker Hub: <a 
href="https://hub.docker.com/_/solr";>https://hub.docker.com/_/solr</a>.  You 
may need to re-pull the image.</li>
 <li>Manually update the version of Log4J on your runtime classpath and restart 
your Solr application.</li>
 <li>(Linux/MacOS) Edit your <code>solr.in.sh</code> file to include:

Reply via email to