-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to apply mitigation for CVE-2021-44228 #384
Comments
That is the correct way to mitigate the CVE. And you are correct, it's a good option to have by default. |
Pinning this, so that others can see the mitigation step if they come looking for information. |
@HoustonPutman another thing I have just thought of: should we also be concerned about the Zookeeper that is created for a SolrCloud? Edit: or rather, that may be created for a SolrCloud, if Edit2: I have got as far as finding https://zookeeper.apache.org/security.html, which doesn't mention anything. And my Googling finds nothing useful looking, eg https://www.google.com/search?q=zookeeper+log4j&tbs=qdr:w |
@plumdog were u able to find anything about zookeeper? Also when this is set in solropts, is there a way for me to confirm it is passed? I thought I would see it in the Solr UI somewhere. |
I'm not sure whether this effects zookeeper but I think you first would need access to the solr pod so first mitigation suffices? |
Have opened pravega/zookeeper-operator#422 to try to work out how zookeeper-operator is impacted and how to mitigate. |
Ok, from pravega/zookeeper-operator#422 (comment), believe Zookeeper not impacted, so I think the mitigation above is sufficient. |
Thanks @plumdog really happy with how quickly solr-operator responded to this. Awesome work! |
Does anyone know if the
It doesn't look like |
@nosvalds from here: apache/solr-site#55, the consensus is that the Solr Prometheus Exporter is not actually susceptible to this CVE |
You should see it on the Dashboard tab in the JVM > Args section: |
Can someone with more Java config confidence than me verify that I should not be concerned that I, as in @nosvalds screenshot above have:
Is it correct that one config item starts |
Yes, the new property should be |
It should be mentioned that the official Docker images (_/solr) have been updated to have this fix included by default. If you have |
@HoustonPutman @plumdog i hate to be bearer of bad news :( https://nvd.nist.gov/vuln/detail/CVE-2021-45046 A new CVE issued without a score and previous mitigation won't be enough :( |
Although this was mentioned in the mailing list:
|
All supported docker tags have been updated, i.e. all latest patch versions of 8.x as well as 7.7, 6.6 and 5.5. But not 7.6, 7.5, 6.5, 5.1, 8.10.0 etc. So please make sure you are on a supported tag. See https://issues.apache.org/jira/browse/SOLR-15850 for more. |
I believe from apache/solr#454 (comment) and https://apache.github.io/solr-operator/docs/solr-cloud/solr-cloud-crd.html#custom-solrxml that to mitigate, I need to set:
on a
SolrCloud
resource.Is anyone able to verify my thought process here that this is a valid mitigation?
Ultimately, I suppose solr-operator should run with this set by default.
Edit: also see https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228
The text was updated successfully, but these errors were encountered: