Re: Vulnerabilities in SOLR 8.6.2

2020-12-11 Thread Walter Underwood
mmc.com> > > > From: Narayanan, Lakshmi <mailto:lakshmi.naraya...@mmc.com>> > Sent: Friday, November 13, 2020 11:21 AM > To: solr-user@lucene.apache.org <mailto:solr-user@lucene.apache.org> > Subject: FW: Vulnerabilities in SOLR 8.6.2 > > This is my 5th attempt

FW: Vulnerabilities in SOLR 8.6.2

2020-12-11 Thread Narayanan, Lakshmi
n, Lakshmi Sent: Friday, November 13, 2020 11:21 AM To: solr-user@lucene.apache.org Subject: FW: Vulnerabilities in SOLR 8.6.2 This is my 5th attempt in the last 60 days Is there anyone looking at these mails? Does anyone care?? :( Lakshmi Narayanan Marsh & McLennan Companies 121 River Stre

Re: FW: Vulnerabilities in SOLR 8.6.2

2020-11-13 Thread Kevin Risden
ken,NJ-07030 > > 201-284-3345 > > M: 845-300-3809 > > Email: lakshmi.naraya...@mmc.com > > > > > > *From:* Narayanan, Lakshmi > *Sent:* Thursday, October 22, 2020 1:06 PM > *To:* solr-user@lucene.apache.org > *Subject:* FW: Vulnerabilities in SOLR 8.6

FW: Vulnerabilities in SOLR 8.6.2

2020-11-13 Thread Narayanan, Lakshmi
gt; From: Narayanan, Lakshmi Sent: Thursday, October 22, 2020 1:06 PM To: solr-user@lucene.apache.org Subject: FW: Vulnerabilities in SOLR 8.6.2 This is my 4th attempt to contact Please advise, if there is a build that fixes these vulnerabilities Lakshmi Narayanan Marsh & McLennan Companies 12

Re: Vulnerabilities in SOLR 8.6.2

2020-09-29 Thread Cassandra Targett
Solr follows the ASF policy for reporting vulnerabilities, described in this page on our website: https://lucene.apache.org/solr/security.html. This page also lists known vulnerabilities that have been addressed, with their mitigation steps. Scanning tools are commonly full of false positives

Vulnerabilities in SOLR 8.6.2

2020-09-28 Thread Narayanan, Lakshmi
Hello Solr-User Support team We have installed the SOLR 8.6.2 package into docker container in our DEV environment. Prior to using it, our security team scanned the docker image using SysDig and found a lot of Critical/High/Medium vulnerabilities. The full list is in the attached spreadsheet