This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new beccdf5  Automatic Site Publish by Buildbot
beccdf5 is described below

commit beccdf55c44a7cbe62e388bf7229aeaf313b6085
Author: buildbot <[email protected]>
AuthorDate: Sat Dec 18 12:09:11 2021 +0000

    Automatic Site Publish by Buildbot
---
 output/feeds/all.atom.xml           | 7 ++++---
 output/feeds/solr/security.atom.xml | 7 ++++---
 output/news.html                    | 7 ++++---
 output/security.html                | 7 ++++---
 4 files changed, 16 insertions(+), 12 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 72ba862..db44f70 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -59,9 +59,10 @@ Critical&lt;/p&gt;
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.&lt;/p&gt;
 &lt;p&gt;Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 
through 7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see &lt;a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"&gt;https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126&lt;/a&gt;
 for discussion.&lt;/p&gt;
 &lt;p&gt;Solr's Prometheus Exporter uses Log4J as well but it does not log 
user input or data, so we don't see a risk there.&lt;/p&gt;
-&lt;p&gt;Apache Solr releases are &lt;em&gt;not&lt;/em&gt; vulnerable to the 
followup CVE-2021-45046, because the MDC patterns used by Solr are for the
-collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
-&lt;code&gt;log4j2.formatMsgNoLookups=true&lt;/code&gt; (as described below) 
is suitable to mitigate.&lt;/p&gt;
+&lt;p&gt;Apache Solr releases are &lt;em&gt;not&lt;/em&gt; vulnerable to the 
followup &lt;strong&gt;CVE-2021-45046&lt;/strong&gt; and 
&lt;strong&gt;CVE-2021-45105&lt;/strong&gt;, because the MDC patterns used by 
Solr
+are for the collection, shard, replica, core and node names, and a potential 
trace id, which are all sanitized
+and injected into log files with "&lt;code&gt;%X&lt;/code&gt;". Passing system 
property &lt;code&gt;log4j2.formatMsgNoLookups=true&lt;/code&gt; (as described 
below)
+is suitable to mitigate.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
 Any of the following are enough to prevent this vulnerability for Solr 
servers:&lt;/p&gt;
 &lt;ul&gt;
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index 4e6364e..fb5484d 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -33,9 +33,10 @@ Critical&lt;/p&gt;
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.&lt;/p&gt;
 &lt;p&gt;Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 
through 7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see &lt;a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"&gt;https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126&lt;/a&gt;
 for discussion.&lt;/p&gt;
 &lt;p&gt;Solr's Prometheus Exporter uses Log4J as well but it does not log 
user input or data, so we don't see a risk there.&lt;/p&gt;
-&lt;p&gt;Apache Solr releases are &lt;em&gt;not&lt;/em&gt; vulnerable to the 
followup CVE-2021-45046, because the MDC patterns used by Solr are for the
-collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
-&lt;code&gt;log4j2.formatMsgNoLookups=true&lt;/code&gt; (as described below) 
is suitable to mitigate.&lt;/p&gt;
+&lt;p&gt;Apache Solr releases are &lt;em&gt;not&lt;/em&gt; vulnerable to the 
followup &lt;strong&gt;CVE-2021-45046&lt;/strong&gt; and 
&lt;strong&gt;CVE-2021-45105&lt;/strong&gt;, because the MDC patterns used by 
Solr
+are for the collection, shard, replica, core and node names, and a potential 
trace id, which are all sanitized
+and injected into log files with "&lt;code&gt;%X&lt;/code&gt;". Passing system 
property &lt;code&gt;log4j2.formatMsgNoLookups=true&lt;/code&gt; (as described 
below)
+is suitable to mitigate.&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
 Any of the following are enough to prevent this vulnerability for Solr 
servers:&lt;/p&gt;
 &lt;ul&gt;
diff --git a/output/news.html b/output/news.html
index 2d00237..85106d7 100644
--- a/output/news.html
+++ b/output/news.html
@@ -192,9 +192,10 @@ Critical</p>
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.</p>
 <p>Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 through 
7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see <a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126";>https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126</a>
 for discussion.</p>
 <p>Solr's Prometheus Exporter uses Log4J as well but it does not log user 
input or data, so we don't see a risk there.</p>
-<p>Apache Solr releases are <em>not</em> vulnerable to the followup 
CVE-2021-45046, because the MDC patterns used by Solr are for the
-collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
-<code>log4j2.formatMsgNoLookups=true</code> (as described below) is suitable 
to mitigate.</p>
+<p>Apache Solr releases are <em>not</em> vulnerable to the followup 
<strong>CVE-2021-45046</strong> and <strong>CVE-2021-45105</strong>, because 
the MDC patterns used by Solr
+are for the collection, shard, replica, core and node names, and a potential 
trace id, which are all sanitized
+and injected into log files with "<code>%X</code>". Passing system property 
<code>log4j2.formatMsgNoLookups=true</code> (as described below)
+is suitable to mitigate.</p>
 <p><strong>Mitigation:</strong>
 Any of the following are enough to prevent this vulnerability for Solr 
servers:</p>
 <ul>
diff --git a/output/security.html b/output/security.html
index 6cec587..610d796 100644
--- a/output/security.html
+++ b/output/security.html
@@ -248,9 +248,10 @@ Critical</p>
 Apache Solr releases prior to 8.11.1 were using a bundled version of the 
Apache Log4J library vulnerable to RCE. For full impact and additional detail 
consult the Log4J security page.</p>
 <p>Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 through 
7.3) use Log4J 1.2.17 which may be vulnerable for installations using 
non-default logging configurations that include the JMS Appender, see <a 
href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126";>https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126</a>
 for discussion.</p>
 <p>Solr's Prometheus Exporter uses Log4J as well but it does not log user 
input or data, so we don't see a risk there.</p>
-<p>Apache Solr releases are <em>not</em> vulnerable to the followup 
CVE-2021-45046, because the MDC patterns used by Solr are for the
-collection, shard, replica, core and node names, and a potential trace id, 
which are all sanitized. Passing system property
-<code>log4j2.formatMsgNoLookups=true</code> (as described below) is suitable 
to mitigate.</p>
+<p>Apache Solr releases are <em>not</em> vulnerable to the followup 
<strong>CVE-2021-45046</strong> and <strong>CVE-2021-45105</strong>, because 
the MDC patterns used by Solr
+are for the collection, shard, replica, core and node names, and a potential 
trace id, which are all sanitized
+and injected into log files with "<code>%X</code>". Passing system property 
<code>log4j2.formatMsgNoLookups=true</code> (as described below)
+is suitable to mitigate.</p>
 <p><strong>Mitigation:</strong>
 Any of the following are enough to prevent this vulnerability for Solr 
servers:</p>
 <ul>

Reply via email to